Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5240

Опубликовано: 26 нояб. 2008
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3

Описание

xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.

РелизСтатусПримечание
dapper

released

1.1.1+ubuntu2-7.10
devel

released

1.1.16.1-2ubuntu1
gutsy

released

1.1.7-1ubuntu1.4
hardy

released

1.1.11.1-1ubuntu3.2
intrepid

released

1.1.15-0ubuntu3.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 86%
0.03047
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

nvd
около 17 лет назад

xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.

debian
около 17 лет назад

xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an u ...

github
больше 3 лет назад

xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.

EPSS

Процентиль: 86%
0.03047
Низкий

4.3 Medium

CVSS2