Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-1964

Опубликовано: 25 апр. 2008
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the demux_nsf_send_headers function in src/demuxers/demux_nsf.c in xine-lib allows remote attackers to have an unknown impact via a long copyright field in an NSF header in an NES Sound file, a different issue than CVE-2008-1878. NOTE: a third party claims that the copyright field always has a safe length

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xine-libnot-affectedpackage

Примечания

  • xine-lib (1.1.12) uses strndup to allocate the needed memory and limits it to 32 bytes

  • while copyright is 100 bytes long (+ padding for chunks)

EPSS

Процентиль: 80%
0.01412
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Stack-based buffer overflow in the demux_nsf_send_headers function in src/demuxers/demux_nsf.c in xine-lib allows remote attackers to have an unknown impact via a long copyright field in an NSF header in an NES Sound file, a different issue than CVE-2008-1878. NOTE: a third party claims that the copyright field always has a safe length

nvd
больше 17 лет назад

Stack-based buffer overflow in the demux_nsf_send_headers function in src/demuxers/demux_nsf.c in xine-lib allows remote attackers to have an unknown impact via a long copyright field in an NSF header in an NES Sound file, a different issue than CVE-2008-1878. NOTE: a third party claims that the copyright field always has a safe length

github
больше 3 лет назад

** DISPUTED ** Stack-based buffer overflow in the demux_nsf_send_headers function in src/demuxers/demux_nsf.c in xine-lib allows remote attackers to have an unknown impact via a long copyright field in an NSF header in an NES Sound file, a different issue than CVE-2008-1878. NOTE: a third party claims that the copyright field always has a safe length.

EPSS

Процентиль: 80%
0.01412
Низкий