7.1
CVSSv2

CVE-2008-5238

Published: 26/11/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
VMScore: 632
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions prior to 1.1.15, allows remote malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.

Vulnerable Product Search on Vulmon Subscribe to Product

xine xine 1.0.1

xine xine 1.0

xine xine 1

xine xine 1.1.1

xine xine 1.1.0

xine xine 1.1.11.1

xine xine 1.1.10.1

xine xine 1.1.3

xine xine 1.1.2

xine xine 0.9.13

xine xine 1.1.11

xine xine 1.0.3a

xine xine 1.0.2

xine xine

xine xine 1.1.4

Vendor Advisories

Debian Bug report logs - #498243 xine-lib: multiple heap overflows Package: xine-lib; Maintainer for xine-lib is (unknown); Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Mon, 8 Sep 2008 12:27:02 UTC Severity: grave Tags: help, security, upstream Done: Nico Golde <nion@debianorg> Bug is archive ...
It was discovered that xine-lib did not correctly handle certain malformed Ogg and Windows Media files If a user or automated system were tricked into opening a specially crafted Ogg or Windows Media file, an attacker could cause xine-lib to crash, creating a denial of service This issue only applied to Ubuntu 606 LTS, 710, and 804 LTS (CVE-2 ...