CVE-2004-1300 – Xine-Lib 0.9/1 - Remote Client-Side Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-1300
Buffer overflow in the open_aiff_file function in demux_aiff.c for xine-lib (libxine) 1-rc7 allows remote attackers to execute arbitrary code via a crafted AIFF file. • https://www.exploit-db.com/exploits/24978 http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt http://www.mandriva.com/security/advisories?name=MDKSA-2005:011 https://exchange.xforce.ibmcloud.com/vulnerabilities/18611 •
CVE-2004-1379
https://notcve.org/view.php?id=CVE-2004-1379
Heap-based buffer overflow in the DVD subpicture decoder in xine xine-lib 1-rc5 and earlier allows remote attackers to execute arbitrary code via a (1) DVD or (2) MPEG subpicture header where the second field reuses RLE data from the end of the first field. • http://slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.320308 http://www.debian.org/security/2005/dsa-657 http://www.gentoo.org/security/en/glsa/glsa-200409-30.xml http://www.securityfocus.com/archive/1/375482/2004-09-02/2004-09-08/0 http://www.securityfocus.com/bid/11205 http://www.vuxml.org/freebsd/131bd7c4-64a3-11d9-829a-000a95bc6fae.html http://xinehq.de/index.php/security/XSA-2004-5 https://exchange.xforce.ibmcloud.com/vulnerabilities •
CVE-2004-0433
https://notcve.org/view.php?id=CVE-2004-0433
Multiple buffer overflows in the Real-Time Streaming Protocol (RTSP) client for (1) MPlayer before 1.0pre4 and (2) xine lib (xine-lib) before 1-rc4, when playing Real RTSP (realrtsp) streams, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (a) long URLs, (b) long Real server responses, or (c) long Real Data Transport (RDT) packets. Múltiples desbordamientos de búfer en cliente Real-Time Streaming Protocol (RTSP) de (1) MPlayer anteriores a 1.0pre4 y (2) xine lib (xine-lib) anteriores a 1-rc4, cuando reproduce secuencias Real trsp (realrtsp), que permiten a atacantes remotos causar una denegación de servivio (caída) y posiblemente ejecutar código de su eleccion mediante (a) URLs largas, (b) respuestas de servidor Real largas, o (c) paquetes de transporte de datos Real (RDT) largos. • http://security.gentoo.org/glsa/glsa-200405-24.xml http://www.xinehq.de/index.php/security/XSA-2004-3 https://exchange.xforce.ibmcloud.com/vulnerabilities/16019 •