Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-5243

Опубликовано: 26 нояб. 2008
Источник: debian

Описание

The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xine-libfixed1.1.16-1package
xine-libfixed1.1.14-4lennypackage
xine-libfixed1.1.14-4squeezepackage

Примечания

  • these are just invalid reads that result in segfaults, denial of service doesnt

  • apply here as xine reading a file is no service -> application bug

Связанные уязвимости

ubuntu
около 17 лет назад

The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error.

nvd
около 17 лет назад

The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error.

github
больше 3 лет назад

The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error.