5
CVSSv2

CVE-2009-1274

Published: 08/04/2009 Updated: 10/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and previous versions allows remote malicious users to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

xine xine-lib 1.1.11

xine xine-lib 1.1.11.1

xine xine-lib 1.1.10

xine xine-lib 1.1.14

xine xine-lib 1.1.13

xine xine-lib 1.1.16.1

xine xine-lib 1.1.16.2

xine xine-lib 1.1.15

xine xine-lib 1.1.12

xine xine-lib 1.1.1

xine xine-lib 1.1.10.1

xine xine-lib 1.1.0

Vendor Advisories

Debian Bug report logs - #522811 xine-lib: heap-based buffer overflow due to integer overflow in quicktime atom parsing Package: xine-lib; Maintainer for xine-lib is (unknown); Reported by: Nico Golde <nion@debianorg> Date: Mon, 6 Apr 2009 16:30:02 UTC Severity: grave Tags: patch, pending, security Found in version 11 ...
It was discovered that the QT demuxer in xine-lib did not correctly handle a large count value in an STTS atom, resulting in a heap-based buffer overflow If a user or automated system were tricked into opening a specially crafted MOV file, an attacker could execute arbitrary code as the user invoking the program (CVE-2009-1274) ...