CVE-2008-5236
Vulnerability from cvelistv5
Published
2008-11-26 01:00
Modified
2024-08-07 10:49
Severity ?
EPSS score ?
Summary
Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c. NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:11.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31567" }, { "name": "30797", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30797" }, { "name": "xinelib-openrafile-bo(44642)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44642" }, { "name": "33544", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33544" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=619869" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/analysis/2008-008/analysis.txt" }, { "name": "xinelib-parseblockgroup-bo(44634)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44634" }, { "name": "4648", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4648" }, { "name": "ADV-2008-2427", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2427" }, { "name": "31827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31827" }, { "name": "47744", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/47744" }, { "name": "FEDORA-2008-7572", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html" }, { "name": "SUSE-SR:2009:004", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "31502", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31502" }, { "name": "ADV-2008-2382", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2382" }, { "name": "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded" }, { "name": "MDVSA-2009:020", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020" }, { "name": "FEDORA-2009-0542", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html" }, { "name": "FEDORA-2008-7512", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c. NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31567", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31567" }, { "name": "30797", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30797" }, { "name": "xinelib-openrafile-bo(44642)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44642" }, { "name": "33544", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33544" }, { "tags": [ "x_refsource_MISC" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=619869" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/analysis/2008-008/analysis.txt" }, { "name": "xinelib-parseblockgroup-bo(44634)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44634" }, { "name": "4648", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4648" }, { "name": "ADV-2008-2427", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2427" }, { "name": "31827", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31827" }, { "name": "47744", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/47744" }, { "name": "FEDORA-2008-7572", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html" }, { "name": "SUSE-SR:2009:004", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "31502", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31502" }, { "name": "ADV-2008-2382", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2382" }, { "name": "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded" }, { "name": "MDVSA-2009:020", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020" }, { "name": "FEDORA-2009-0542", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html" }, { "name": "FEDORA-2008-7512", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5236", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c. NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31567", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31567" }, { "name": "30797", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30797" }, { "name": "xinelib-openrafile-bo(44642)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44642" }, { "name": "33544", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33544" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=619869", "refsource": "MISC", "url": "http://sourceforge.net/project/shownotes.php?release_id=619869" }, { "name": "http://www.ocert.org/analysis/2008-008/analysis.txt", "refsource": "MISC", "url": "http://www.ocert.org/analysis/2008-008/analysis.txt" }, { "name": "xinelib-parseblockgroup-bo(44634)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44634" }, { "name": "4648", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4648" }, { "name": "ADV-2008-2427", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2427" }, { "name": "31827", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31827" }, { "name": "47744", "refsource": "OSVDB", "url": "http://www.osvdb.org/47744" }, { "name": "FEDORA-2008-7572", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html" }, { "name": "SUSE-SR:2009:004", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "31502", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31502" }, { "name": "ADV-2008-2382", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2382" }, { "name": "20080822 [oCERT-2008-008] multiple heap overflows in xine-lib", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded" }, { "name": "MDVSA-2009:020", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020" }, { "name": "FEDORA-2009-0542", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html" }, { "name": "FEDORA-2008-7512", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5236", "datePublished": "2008-11-26T01:00:00", "dateReserved": "2008-11-25T00:00:00", "dateUpdated": "2024-08-07T10:49:11.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-5236\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-11-26T01:30:00.517\",\"lastModified\":\"2024-11-21T00:53:37.703\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c. NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer basados en mont\u00edculo en xine-lib v1.1.12 y otra v1.1.15 y versiones anteriores , permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores relacionados con (1) un tama\u00f1o manipulado del elemento EBML procesado por la funci\u00f3n parse_block_group en demux_matroska.c; (2) una determinada combinaci\u00f3n de los valores \\\"sps\\\", \\\"w\\\" y \\\"h\\\" procesados por las funciones real_parse_audio_specific_data y demux_real_send_chunk functions en demux_real.c y (3) una combinaci\u00f3n no especificada de tres valores procesados por la funci\u00f3n open_ra_file en demux_realaudio.c. NOTA: Al parecer el vector 2 existe por una reparaci\u00f3n incompleta en la v1.1.15.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.5\",\"matchCriteriaId\":\"52E2289A-767D-445B-8AF5-4201E3806F78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DE52C9-2381-483F-956D-C83503EBA664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A119AB14-EDB5-4C79-9058-60E610636728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C4B2D6-DBAE-46CF-BE49-FC221B340726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*\",\"matchCriteriaId\":\"197D04B5-8053-484F-A070-894BC9611C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2B22E87-6736-4C5B-A1A6-A3EA0064C10D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2CD2BA-DFFD-4A9C-8B09-4793BB723717\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B993E680-B4FE-4DE5-800C-1E6B7C44849A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7100421-9BF9-4A07-AD54-C3D9CDCFBF90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6BE4F65-E942-4259-94E3-95E7F95B2E9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCD596C-B080-4A98-BF14-57DDC370CCEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"4272CD6A-E384-4035-A09A-C63927191CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D5828FA-6320-4983-AA70-ADFE9B475EAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E12B75F-1820-42F9-8B7C-3024D5C37B02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*\",\"matchCriteriaId\":\"31B68858-0176-4CB0-B015-256EC1796D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"41844D73-EE25-4835-A9C5-08AADDA2CE62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"52EFFE9E-6A25-4A27-B483-96AA4A7C7660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB9BA4F-0814-45C4-93C8-04DBFF8FC8D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D49B22F-8C56-4842-8DE7-36011523E150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B643DB4-63D2-4BA1-89B4-2EF813771718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FC619B-E611-4996-A12B-37830FD5B91B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D3DB46-02A6-4D63-B052-2458FB181DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*\",\"matchCriteriaId\":\"5083B06C-C9B2-4011-B8B0-23FECE2DD100\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A03425FA-BB45-4FF4-B551-2A63129BDFC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B68EA2-EBCA-4272-B43E-9C2916447869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"C609073D-30DF-42BF-B515-773205601FB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD535324-2B5B-4535-A33B-29487F8FA4CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234EF75C-C5AA-4FAA-85C7-77EFBB35AF61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB02215-E511-4974-8AE3-834CAE630D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449D32E9-C204-4429-8DE5-9677BEC1DEFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AC157F9-D90C-4457-A17B-A4DB52E92855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856C23D9-14FC-4264-B85B-1E0D67FA73B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89C1C896-C115-451D-840A-2DE3430B6D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"464603A5-ECBE-486A-BFC9-921D0B4D39D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E0A1D4E-A0C5-4063-A354-1D8782A89A78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2A24E4-CB4A-4D71-804F-63DA24563D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB6DB2-E29D-48E2-A092-B9D99230C383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06E97F97-F3E4-48F8-BC24-E88AF98B93A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBCA9DB3-5F48-4078-84D2-CC65E04058F9\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31502\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31567\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31827\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33544\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/4648\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sourceforge.net/project/shownotes.php?release_id=619869\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:020\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ocert.org/analysis/2008-008/analysis.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/47744\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/495674/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/30797\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2382\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2427\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44634\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44642\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31502\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33544\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/4648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/project/shownotes.php?release_id=619869\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:020\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ocert.org/analysis/2008-008/analysis.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/47744\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/495674/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/30797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2427\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44634\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44642\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.