9.3
CVSSv2

CVE-2008-5236

Published: 26/11/2008 Updated: 11/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and previous versions versions, allow remote malicious users to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c. NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.

Vulnerable Product Search on Vulmon Subscribe to Product

xine xine 1.1.1

xine xine 1.1.0

xine xine 1

xine xine 1.1.10.1

xine xine 1.1.4

xine xine 1.0.1

xine xine 1.0

xine xine 1.0.3a

xine xine 1.0.2

xine xine

xine xine 1.1.3

xine xine 1.1.2

xine xine 0.9.13

xine xine 1.1.11

xine xine 1.1.11.1

Vendor Advisories

Debian Bug report logs - #498243 xine-lib: multiple heap overflows Package: xine-lib; Maintainer for xine-lib is (unknown); Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Mon, 8 Sep 2008 12:27:02 UTC Severity: grave Tags: help, security, upstream Done: Nico Golde <nion@debianorg> Bug is archive ...
It was discovered that xine-lib did not correctly handle certain malformed Ogg and Windows Media files If a user or automated system were tricked into opening a specially crafted Ogg or Windows Media file, an attacker could cause xine-lib to crash, creating a denial of service This issue only applied to Ubuntu 606 LTS, 710, and 804 LTS (CVE-2 ...