CVE-2006-1664 – Libxine 1.14 - MPEG Stream Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2006-1664
Buffer overflow in xine_list_delete_current in libxine 1.14 and earlier, as distributed in xine-lib 1.1.1 and earlier, allows remote attackers to execute arbitrary code via a crafted MPEG stream. • https://www.exploit-db.com/exploits/1641 http://bugs.gentoo.org/show_bug.cgi?id=128838 http://secunia.com/advisories/19853 http://secunia.com/advisories/19856 http://secunia.com/advisories/28666 http://securitytracker.com/id?1015868 http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=571608 http://www.gentoo.org/security/en/glsa/glsa-200604-16.xml http://www.securityfocus.com/bid/17370 http://www.securityfocus.com/data/vulnerabilities/exploits/xinelib_poc.pl •
CVE-2005-2967 – Xine-Lib 1.1 - 'Media Player Library' Remote Format String
https://notcve.org/view.php?id=CVE-2005-2967
Format string vulnerability in input_cdda.c in xine-lib 1-beta through 1-beta 3, 1-rc, 1.0 through 1.0.2, and 1.1.1 allows remote servers to execute arbitrary code via format string specifiers in metadata in CDDB server responses when the victim plays a CD. • https://www.exploit-db.com/exploits/1242 http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0196.html http://secunia.com/advisories/17097 http://secunia.com/advisories/17099 http://secunia.com/advisories/17111 http://secunia.com/advisories/17132 http://secunia.com/advisories/17162 http://secunia.com/advisories/17179 http://secunia.com/advisories/17282 http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.415454 http://www.debian.org/ •
CVE-2005-1692
https://notcve.org/view.php?id=CVE-2005-1692
Format string vulnerability in gxine 0.4.1 through 0.4.4, and other versions down to 0.3, allows remote attackers to execute arbitrary code via a ram file with a URL whose hostname contains format string specifiers. • http://cvs.sourceforge.net/viewcvs.py/xine/gnome-xine/ChangeLog?rev=HEAD&content-type=text/vnd.viewcvs-markup http://marc.info/?l=bugtraq&m=111670637812128&w=2 http://secunia.com/advisories/15451 http://security.gentoo.org/glsa/glsa-200505-19.xml http://www.0xbadexworm.org/adv/gxinefmt.txt http://www.osvdb.org/16747 http://www.securityfocus.com/bid/13707 http://www.vupen.com/english/advisories/2005/0626 •
CVE-2005-1195
https://notcve.org/view.php?id=CVE-2005-1195
Multiple heap-based buffer overflows in the code used to handle (1) MMS over TCP (MMST) streams or (2) RealMedia RTSP streams in xine-lib before 1.0, and other products that use xine-lib such as MPlayer 1.0pre6 and earlier, allow remote malicious servers to execute arbitrary code. • http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/librtsp/rtsp.c?r1=1.18&r2=1.19&diff_format=u http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/mms.c?r1=1.55&r2=1.56&diff_format=u http://seclists.org/lists/bugtraq/2005/Apr/0337.html http://secunia.com/advisories/15014 http://securitytracker.com/id?1013771 http://www.gentoo.org/security/en/glsa/glsa-200504-19.xml http://www.mplayerhq.hu/homepage/design7/news.html#vuln10 http:/ •
CVE-2004-1455
https://notcve.org/view.php?id=CVE-2004-1455
Stack-based buffer overflow in Xine-lib-rc5 in xine-lib 1_rc5-r2 and earlier allows remote attackers to execute arbitrary code via crafted playlists that result in a long vcd:// URL. • http://marc.info/?l=bugtraq&m=109284737628045&w=2 http://open-security.org/advisories/6 http://secunia.com/advisories/12194 http://www.gentoo.org/security/en/glsa/glsa-200408-18.xml http://www.securityfocus.com/bid/10890 https://exchange.xforce.ibmcloud.com/vulnerabilities/16930 •