Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-5238

Опубликовано: 26 нояб. 2008
Источник: debian

Описание

Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xine-libfixed1.1.14-3package

Примечания

  • code execution shouldn't work here as if 0xff will be extended to 0xffffffff

  • memcpy fails for copying from the complete addressable address space long before any code is executed

  • the malloc check for type_specific_data is missing, minor issue filed as #508065

Связанные уязвимости

ubuntu
около 17 лет назад

Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.

nvd
около 17 лет назад

Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.

github
больше 3 лет назад

Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.