6.4
CVSSv2

CVE-2008-0225

Published: 10/01/2008 Updated: 17/10/2011
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and previous versions allows remote malicious users to execute arbitrary code via the SDP Abstract attribute in an RTSP session, related to the rmff_dump_header function and related to disregarding the max field. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

xine xine-lib

Vendor Advisories

Alin Rad Pop discovered an array index vulnerability in the SDP parser If a user or automated system were tricked into opening a malicious RTSP stream, a remote attacker may be able to execute arbitrary code with the privileges of the user invoking the program (CVE-2008-0073) ...
Luigi Auriemma discovered that the Xine media player library performed insufficient input sanitising during the handling of RTSP streams, which could lead to the execution of arbitrary code For the old stable distribution (sarge), this problem has been fixed in version 101-1sarge6 For the stable distribution (etch), this problem has been fixed ...

Exploits

source: wwwsecurityfocuscom/bid/27198/info The xine-lib library is prone to a remote heap-based buffer-overflow vulnerability This issue occurs because the software fails to perform adequate boundary checks on user-supplied data An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the aff ...