CVE-2008-0486
Ubuntu Security Notice 635-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Array index vulnerability in libmpdemux/demux_audio.c in MPlayer 1.0rc2 and SVN before r25917, and possibly earlier versions, as used in Xine-lib 1.1.10, might allow remote attackers to execute arbitrary code via a crafted FLAC tag, which triggers a buffer overflow.
Vulnerabilidad de índice de array en libmpdemux/demux_audio.c de MPlayer 1.0rc2 y SVN antes de r25917, y posiblemente versiones anteriores, como se utilizó en Xine-lib 1.1.10. Podría permitir a atacantes remotos ejecutar código de su elección a través de una etiqueta FLAC manipulada que provoca un desbordamiento de búfer.
An array index vulnerability found in the FLAC audio demuxer might allow remote attackers to execute arbitrary code via a crafted FLAC tag, which triggers a buffer overflow. Although originally an MPlayer issue, it also affects xine-lib due to code similarity. The previous update used a bad patch which made Amarok interface very unresponsive while playing FLAC files. This new update fixes the security issue with a better patch.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-01-29 CVE Reserved
- 2008-02-04 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-189: Numeric Errors
CAPEC
References (33)
URL | Tag | Source |
---|---|---|
http://bugs.gentoo.org/show_bug.cgi?id=209106 | X_refsource_confirm | |
http://bugs.xine-project.org/show_bug.cgi?id=38 | X_refsource_confirm | |
http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060033.html | Mailing List | |
http://secunia.com/advisories/31393 | Third Party Advisory | |
http://securityreason.com/securityalert/3608 | Third Party Advisory | |
http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=574735 | X_refsource_confirm | |
http://www.mplayerhq.hu/design7/news.html | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/487501/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/27441 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/0406/references | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/0421 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=431541 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
http://www.coresecurity.com/?action=item&id=2103 | 2024-08-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mplayer Search vendor "Mplayer" | Mplayer Search vendor "Mplayer" for product "Mplayer" | 1.02rc2 Search vendor "Mplayer" for product "Mplayer" and version "1.02rc2" | - |
Affected
| ||||||
Xine Search vendor "Xine" | Xine-lib Search vendor "Xine" for product "Xine-lib" | 1.1.10 Search vendor "Xine" for product "Xine-lib" and version "1.1.10" | - |
Affected
|