Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0235

Опубликовано: 16 апр. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0235: speex security update (IMPORTANT)

[1.0.5-4.el5_1.1]

  • Check for headers with invalid mode numbers (#442037, CVE-2008-1686)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

speex

1.0.5-4.el5_1.1

speex-devel

1.0.5-4.el5_1.1

Oracle Linux x86_64

speex

1.0.5-4.el5_1.1

speex-devel

1.0.5-4.el5_1.1

Oracle Linux i386

speex

1.0.5-4.el5_1.1

speex-devel

1.0.5-4.el5_1.1

Связанные CVE

Связанные уязвимости

ubuntu
почти 18 лет назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.

redhat
почти 18 лет назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.

nvd
почти 18 лет назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.

debian
почти 18 лет назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libf ...

github
почти 4 года назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.