Описание
Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 1.1.1+ubuntu2-7.10 |
| devel | not-affected | 1.1.15-0ubuntu1 |
| gutsy | released | 1.1.7-1ubuntu1.4 |
| hardy | released | 1.1.11.1-1ubuntu3.2 |
| intrepid | not-affected | 1.1.15-0ubuntu1 |
| upstream | released | 1.1.15 |
Показывать по
EPSS
7.1 High
CVSS2
Связанные уязвимости
Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.
Integer overflow in the real_parse_mdpr function in demux_real.c in xi ...
Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.
EPSS
7.1 High
CVSS2