Page 4 of 23 results (0.007 seconds)

CVSS: 10.0EPSS: 4%CPEs: 78EXPL: 0

Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188. • http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21 http://www.idefense.com/application/poi/display?id=176&type=vulnerabilities http://www.mandriva.com/security/advisories?name=MDKSA-2005:011 http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff https://exchange.xforce.ibmcloud.com/vulnerabilities/18640 •

CVSS: 10.0EPSS: 3%CPEs: 11EXPL: 1

Buffer overflow in the get_header function in asf_mmst_streaming.c for MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a crafted ASF video stream. • http://tigger.uic.edu/~jlongs2/holes/mplayer.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/18631 •

CVSS: 10.0EPSS: 0%CPEs: 78EXPL: 0

The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187. • http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21 http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities http://www.mandriva.com/security/advisories?name=MDKSA-2005:011 http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff https://exchange.xforce.ibmcloud.com/vulnerabilities/18638 •

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 0

Stack-based buffer overflow in the asf_mmst_streaming.c functionality for MPlayer 1.0pre5 allows remote attackers to execute arbitrary code via a large MMST stream packet. • http://www.idefense.com/application/poi/display?id=167 http://www.mandriva.com/security/advisories?name=MDKSA-2004:157 http://www1.mplayerhq.hu/MPlayer/patches/mmst_fix_20041215.diff http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog https://exchange.xforce.ibmcloud.com/vulnerabilities/18526 •

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 0

Integer overflow in the real_setup_and_get_header function in real.c for Unix MPlayer 1.0pre5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a Real RTSP streaming media file with a -1 content-length field, which leads to a heap-based buffer overflow. • http://www.idefense.com/application/poi/display?id=166 http://www.mandriva.com/security/advisories?name=MDKSA-2004:157 http://www1.mplayerhq.hu/MPlayer/patches/rtsp_fix_20041215.diff http://www1.mplayerhq.hu/MPlayer/releases/ChangeLog https://exchange.xforce.ibmcloud.com/vulnerabilities/18525 •