2 results (0.003 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in the (1) main function in (a) client.c, and the (2) server_setup and (3) server_client_connect functions in (b) server.c in gxine 0.5.9 and earlier allow local users to cause a denial of service (daemon crash) or gain privileges via a long HOME environment variable. NOTE: some of these details are obtained from third party information. Múltiples desbordamientos de búfer en la función (1) main en (a) client.c, y las funciones (2) server_setup y (3) server_client_connect en (b) server.c en gxine 0.5.9 y anteriores permiten a usuarios locales provocar denegación de servicio a tavés de la variable de entorno HOME. NOTA: los detalles han sido obtenidos a partir de la información de terceros. • http://osvdb.org/38320 http://osvdb.org/38321 http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=476891 http://www.vupen.com/english/advisories/2007/0259 http://xinehq.de/index.php/news?show_category_id=1 https://exchange.xforce.ibmcloud.com/vulnerabilities/31604 •

CVSS: 5.0EPSS: 20%CPEs: 5EXPL: 3

Buffer overflow in the HTTP Plugin (xineplug_inp_http.so) for xine-lib 1.1.1 allows remote attackers to cause a denial of service (application crash) via a long reply from an HTTP server, as demonstrated using gxine 0.5.6. Desbordamiento de búfer en el HTTP Plugin (xineplug_inp_http.so) para xine-lib 1.1.1 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de una respuesta larga de un servidor HTTP, según lo demostrado usando gxine 0.5.6. • https://www.exploit-db.com/exploits/1852 http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html http://secunia.com/advisories/20369 http://secunia.com/advisories/20549 http://secunia.com/advisories/20766 http://secunia.com/advisories/20828 http://secunia.com/advisories/20942 http://secunia.com/advisories/21919 http://security.gentoo.org/glsa/glsa-200609-08.xml http://www.debian.org/security/2006/dsa-1105 http://www.mandriva.com/security/advisories?name= •