Page 3 of 15 results (0.007 seconds)

CVSS: 10.0EPSS: 4%CPEs: 78EXPL: 0

Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188. • http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21 http://www.idefense.com/application/poi/display?id=176&type=vulnerabilities http://www.mandriva.com/security/advisories?name=MDKSA-2005:011 http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff https://exchange.xforce.ibmcloud.com/vulnerabilities/18640 •

CVSS: 10.0EPSS: 0%CPEs: 78EXPL: 0

The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187. • http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21 http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities http://www.mandriva.com/security/advisories?name=MDKSA-2005:011 http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff https://exchange.xforce.ibmcloud.com/vulnerabilities/18638 •

CVSS: 7.5EPSS: 7%CPEs: 41EXPL: 0

Heap-based buffer overflow in the DVD subpicture decoder in xine xine-lib 1-rc5 and earlier allows remote attackers to execute arbitrary code via a (1) DVD or (2) MPEG subpicture header where the second field reuses RLE data from the end of the first field. • http://slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.320308 http://www.debian.org/security/2005/dsa-657 http://www.gentoo.org/security/en/glsa/glsa-200409-30.xml http://www.securityfocus.com/archive/1/375482/2004-09-02/2004-09-08/0 http://www.securityfocus.com/bid/11205 http://www.vuxml.org/freebsd/131bd7c4-64a3-11d9-829a-000a95bc6fae.html http://xinehq.de/index.php/security/XSA-2004-5 https://exchange.xforce.ibmcloud.com/vulnerabilities&#x •

CVSS: 10.0EPSS: 8%CPEs: 16EXPL: 0

Multiple buffer overflows in the Real-Time Streaming Protocol (RTSP) client for (1) MPlayer before 1.0pre4 and (2) xine lib (xine-lib) before 1-rc4, when playing Real RTSP (realrtsp) streams, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (a) long URLs, (b) long Real server responses, or (c) long Real Data Transport (RDT) packets. Múltiples desbordamientos de búfer en cliente Real-Time Streaming Protocol (RTSP) de (1) MPlayer anteriores a 1.0pre4 y (2) xine lib (xine-lib) anteriores a 1-rc4, cuando reproduce secuencias Real trsp (realrtsp), que permiten a atacantes remotos causar una denegación de servivio (caída) y posiblemente ejecutar código de su eleccion mediante (a) URLs largas, (b) respuestas de servidor Real largas, o (c) paquetes de transporte de datos Real (RDT) largos. • http://security.gentoo.org/glsa/glsa-200405-24.xml http://www.xinehq.de/index.php/security/XSA-2004-3 https://exchange.xforce.ibmcloud.com/vulnerabilities/16019 •

CVSS: 2.1EPSS: 0%CPEs: 19EXPL: 0

xine allows local users to overwrite arbitrary files via a symlink attack on a bug report email that is generated by the (1) xine-bugreport or (2) xine-check scripts. xine permite a usuarios locales sobreecribir ficheros arbitrarios mediante un ataque de enlaces simbólicos (symlink attack) aprovechando un correo electrónico de informe de errores que es generado por los scripts xine-bugreport o xine-check. • http://marc.info/?l=bugtraq&m=107997911025558&w=2 http://security.gentoo.org/glsa/glsa-200404-20.xml http://www.debian.org/security/2004/dsa-477 http://www.securityfocus.com/bid/9939 https://exchange.xforce.ibmcloud.com/vulnerabilities/15564 •