Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-1878

Опубликовано: 17 апр. 2008
Источник: redhat
EPSS Низкий

Описание

Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=442882xine-lib: buffer overflow in nsf demuxer (CVE-2008-1964)

EPSS

Процентиль: 90%
0.06108
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.

nvd
больше 17 лет назад

Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.

debian
больше 17 лет назад

Stack-based buffer overflow in the demux_nsf_send_chunk function in sr ...

github
больше 3 лет назад

Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.

EPSS

Процентиль: 90%
0.06108
Низкий