5
CVSSv2

CVE-2006-2802

Published: 03/06/2006 Updated: 03/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Buffer overflow in the HTTP Plugin (xineplug_inp_http.so) for xine-lib 1.1.1 allows remote malicious users to cause a denial of service (application crash) via a long reply from an HTTP server, as demonstrated using gxine 0.5.6.

Vulnerable Product Search on Vulmon Subscribe to Product

xine xine-lib 1.0.1

xine xine-lib 1.0.2

xine gxine 0.5.6

xine xine-lib 1.1.0

xine xine-lib 1.1.1

Vendor Advisories

Federico L Bossi Bonin discovered a buffer overflow in the HTTP input module By tricking an user into opening a malicious remote media location, a remote attacker could exploit this to crash Xine library frontends (like totem-xine, gxine, or xine-ui) and possibly even execute arbitrary code with the user’s privileges ...

Exploits

////////////////////////////////////////////////////// // gxine - HTTP Plugin Remote Buffer Overflow PoC ///////////////////////////////////////////////////// // // Federico L Bossi Bonin // fbossi[at]netcomm[dot]com[dot]ar ///////////////////////////////////////////////////// // TESTED on gxine 056 //////////////////////// // 0xb78eccc7 in fr ...