CVE-2008-0225
Xine-Lib 1.1.9 - 'rmff_dump_cont()' Remote Heap Buffer Overflow (PoC)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute in an RTSP session, related to the rmff_dump_header function and related to disregarding the max field. NOTE: some of these details are obtained from third party information.
Un desbordamiento del búfer en la región heap de la memoria en la función rmff_dump_cont en la biblioteca input/libreal/rmff.c en xine-lib versión 1.1.9 y anteriores, permite a atacantes remotos ejecutar código arbitrario por medio del atributo SDP Abstract en una sesión RTSP, relacionada a la función rmff_dump_header y relacionada con la omisión del campo max. NOTA: algunos de estos detalles son obtenidos de información de terceros.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-01-09 First Exploit
- 2008-01-10 CVE Reserved
- 2008-01-10 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (21)
URL | Tag | Source |
---|---|---|
http://bugs.gentoo.org/show_bug.cgi?id=205197 | X_refsource_confirm | |
http://sourceforge.net/project/shownotes.php?release_id=567872 | X_refsource_confirm | |
http://www.securityfocus.com/bid/27198 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=428620 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/31002 | 2008-01-09 | |
http://aluigi.altervista.org/adv/xinermffhof-adv.txt | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/28384 | 2011-10-17 | |
http://secunia.com/advisories/28489 | 2011-10-17 | |
http://secunia.com/advisories/28507 | 2011-10-17 | |
http://secunia.com/advisories/28636 | 2011-10-17 | |
http://secunia.com/advisories/28674 | 2011-10-17 | |
http://secunia.com/advisories/28955 | 2011-10-17 | |
http://secunia.com/advisories/31393 | 2011-10-17 | |
http://security.gentoo.org/glsa/glsa-200801-12.xml | 2011-10-17 | |
http://www.debian.org/security/2008/dsa-1472 | 2011-10-17 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:020 | 2011-10-17 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:045 | 2011-10-17 | |
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html | 2011-10-17 | |
http://www.ubuntu.com/usn/usn-635-1 | 2011-10-17 | |
http://www.vupen.com/english/advisories/2008/0163 | 2011-10-17 | |
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00592.html | 2011-10-17 |