Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0235

Опубликовано: 16 апр. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0235: speex security update (IMPORTANT)

[1.0.5-4.el5_1.1]

  • Check for headers with invalid mode numbers (#442037, CVE-2008-1686)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

speex

1.0.5-4.el5_1.1

speex-devel

1.0.5-4.el5_1.1

Oracle Linux x86_64

speex

1.0.5-4.el5_1.1

speex-devel

1.0.5-4.el5_1.1

Oracle Linux i386

speex

1.0.5-4.el5_1.1

speex-devel

1.0.5-4.el5_1.1

Связанные CVE

Связанные уязвимости

ubuntu
около 17 лет назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.

redhat
около 17 лет назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.

nvd
около 17 лет назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.

debian
около 17 лет назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libf ...

github
около 3 лет назад

Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.