Информационная безопасность
[RU] switch to English


Переполнение буфера в Xine / MPlayer / VLC
дополнено с 21 января 2008 г.
Опубликовано:25 марта 2008 г.
Источник:
SecurityVulns ID:8592
Тип:библиотека
Уровень опасности:
6/10
Описание:Переполнения буфера и переполнение индекса массива при разборе RTSP.
Затронутые продукты:MPLAYER : MPlayer 1.0
 XINE : xine 1.1
 XINE : xinelib 1.1
 VLC : VLC 0.8
CVE:CVE-2008-0238 (Multiple heap-based buffer overflows in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to execute arbitrary code via the SDP (1) Title, (2) Author, or (3) Copyright attribute, related to the rmff_dump_header function, different vectors than CVE-2008-0225. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.)
 CVE-2008-0235 (The Microsoft VFP_OLE_Server ActiveX control allows remote attackers to execute arbitrary code by invoking the foxcommand method.)
 CVE-2008-0225 (Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute, related to the rmff_dump_header function and related to disregarding the max field. NOTE: some of these details are obtained from third party information.)
 CVE-2008-0073
Оригинальный текстdocumentGuido Landi, [Full-disclosure] CVE-2008-0073 - MPlayer and VLC "sdpplin_parse()" Array Indexing Vulnerability (25.03.2008)
 documentDEBIAN, [SECURITY] [DSA 1472-1] New xine-lib packages fix arbitrary code execution (21.01.2008)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород