10
CVSSv2

CVE-2008-5237

Published: 26/11/2008 Updated: 11/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple integer overflows in xine-lib 1.1.12, and other 1.1.15 and previous versions versions, allow remote malicious users to cause a denial of service (crash) or possibly execute arbitrary code via (1) crafted width and height values that are not validated by the mymng_process_header function in demux_mng.c before use in an allocation calculation or (2) crafted current_atom_size and string_size values processed by the parse_reference_atom function in demux_qt.c for an RDRF_ATOM string.

Vulnerable Product Search on Vulmon Subscribe to Product

xine xine 1.0.3a

xine xine 1.0.2

xine xine 1

xine xine 1.1.4

xine xine

xine xine 1.1.3

xine xine 1.1.2

xine xine 0.9.13

xine xine 1.1.11

xine xine 1.0.1

xine xine 1.0

xine xine 1.1.1

xine xine 1.1.0

xine xine 1.1.11.1

xine xine 1.1.10.1

Vendor Advisories

Debian Bug report logs - #498243 xine-lib: multiple heap overflows Package: xine-lib; Maintainer for xine-lib is (unknown); Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Mon, 8 Sep 2008 12:27:02 UTC Severity: grave Tags: help, security, upstream Done: Nico Golde <nion@debianorg> Bug is archive ...
It was discovered that xine-lib did not correctly handle certain malformed Ogg and Windows Media files If a user or automated system were tricked into opening a specially crafted Ogg or Windows Media file, an attacker could cause xine-lib to crash, creating a denial of service This issue only applied to Ubuntu 606 LTS, 710, and 804 LTS (CVE-2 ...