Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-phwc-q98v-7w98

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Uncontrolled array index in the sdpplin_parse function in stream/realrtsp/sdpplin.c in MPlayer 1.0 rc2 allows remote attackers to overwrite memory and execute arbitrary code via a large streamid SDP parameter. NOTE: this issue has been referred to as an integer overflow.

Uncontrolled array index in the sdpplin_parse function in stream/realrtsp/sdpplin.c in MPlayer 1.0 rc2 allows remote attackers to overwrite memory and execute arbitrary code via a large streamid SDP parameter. NOTE: this issue has been referred to as an integer overflow.

EPSS

Процентиль: 96%
0.21937
Средний

Связанные уязвимости

ubuntu
больше 17 лет назад

Uncontrolled array index in the sdpplin_parse function in stream/realrtsp/sdpplin.c in MPlayer 1.0 rc2 allows remote attackers to overwrite memory and execute arbitrary code via a large streamid SDP parameter. NOTE: this issue has been referred to as an integer overflow.

nvd
больше 17 лет назад

Uncontrolled array index in the sdpplin_parse function in stream/realrtsp/sdpplin.c in MPlayer 1.0 rc2 allows remote attackers to overwrite memory and execute arbitrary code via a large streamid SDP parameter. NOTE: this issue has been referred to as an integer overflow.

debian
больше 17 лет назад

Uncontrolled array index in the sdpplin_parse function in stream/realr ...

EPSS

Процентиль: 96%
0.21937
Средний