Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2008-5234

Опубликовано: 26 нояб. 2008
Источник: nvd
CVSS2: 9.3
EPSS Низкий

Описание

Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c. NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15.

Комментарий

http://secunia.com/advisories/31502

  1. Multiple integer overflows exist within the processing of ID3 tags in src/demuxers/id3.c. These can be exploited to cause heap-based buffer overflows via overly large ID3 frame header size fields.

  2. Multiple boundary errors exist within the "demux_real_send_chunk()" function in src/demuxers/demux_real.c. These can potentially be exploited to cause heap-based buffer overflows via specially crafted Real Media files.

  3. A boundary error exists within the "open_video_capture_device()" function in src/input/input_v4l.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted V4L stream.

  4. A boundary error exists within the "parse_moov_atom()" function in src/demuxers/demux_qt.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted Quicktime file.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in versions prior to 1.1.15.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
Версия до 1.1.14 (включая)
cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*

EPSS

Процентиль: 90%
0.05523
Низкий

9.3 Critical

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 17 лет назад

Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c. NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15.

debian
около 17 лет назад

Multiple heap-based buffer overflows in xine-lib 1.1.12, and other ver ...

github
больше 3 лет назад

Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c. NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15.

EPSS

Процентиль: 90%
0.05523
Низкий

9.3 Critical

CVSS2

Дефекты

CWE-119