Описание
Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | released | 0.2-7 |
edgy | released | 0.2-7 |
feisty | released | 0.2-7 |
gutsy | released | 0.2-7 |
hardy | released | 0.2-7 |
intrepid | released | 0.2-7 |
jaunty | released | 0.2-7 |
karmic | released | 0.2-7 |
upstream | needs-triage |
Показывать по
EPSS
5.1 Medium
CVSS2
Связанные уязвимости
Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.
Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and ...
Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.
EPSS
5.1 Medium
CVSS2