Page 3 of 13 results (0.002 seconds)

CVSS: 10.0EPSS: 0%CPEs: 78EXPL: 0

The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187. • http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21 http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities http://www.mandriva.com/security/advisories?name=MDKSA-2005:011 http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff https://exchange.xforce.ibmcloud.com/vulnerabilities/18638 •

CVSS: 7.5EPSS: 7%CPEs: 41EXPL: 0

Heap-based buffer overflow in the DVD subpicture decoder in xine xine-lib 1-rc5 and earlier allows remote attackers to execute arbitrary code via a (1) DVD or (2) MPEG subpicture header where the second field reuses RLE data from the end of the first field. • http://slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.320308 http://www.debian.org/security/2005/dsa-657 http://www.gentoo.org/security/en/glsa/glsa-200409-30.xml http://www.securityfocus.com/archive/1/375482/2004-09-02/2004-09-08/0 http://www.securityfocus.com/bid/11205 http://www.vuxml.org/freebsd/131bd7c4-64a3-11d9-829a-000a95bc6fae.html http://xinehq.de/index.php/security/XSA-2004-5 https://exchange.xforce.ibmcloud.com/vulnerabilities&#x •

CVSS: 2.1EPSS: 0%CPEs: 19EXPL: 0

xine allows local users to overwrite arbitrary files via a symlink attack on a bug report email that is generated by the (1) xine-bugreport or (2) xine-check scripts. xine permite a usuarios locales sobreecribir ficheros arbitrarios mediante un ataque de enlaces simbólicos (symlink attack) aprovechando un correo electrónico de informe de errores que es generado por los scripts xine-bugreport o xine-check. • http://marc.info/?l=bugtraq&m=107997911025558&w=2 http://security.gentoo.org/glsa/glsa-200404-20.xml http://www.debian.org/security/2004/dsa-477 http://www.securityfocus.com/bid/9939 https://exchange.xforce.ibmcloud.com/vulnerabilities/15564 •