fkie_cve-2008-5236
Vulnerability from fkie_nvd
Published
2008-11-26 01:30
Modified
2024-11-21 00:53
Severity ?
Summary
Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c. NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
cve@mitre.orghttp://secunia.com/advisories/31502
cve@mitre.orghttp://secunia.com/advisories/31567Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31827
cve@mitre.orghttp://secunia.com/advisories/33544
cve@mitre.orghttp://securityreason.com/securityalert/4648
cve@mitre.orghttp://sourceforge.net/project/shownotes.php?release_id=619869
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:020
cve@mitre.orghttp://www.ocert.org/analysis/2008-008/analysis.txt
cve@mitre.orghttp://www.osvdb.org/47744
cve@mitre.orghttp://www.securityfocus.com/archive/1/495674/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/30797
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2382
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2427
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44634
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44642
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31502
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31567Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31827
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33544
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4648
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=619869
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:020
af854a3a-2127-422b-91ae-364da2661108http://www.ocert.org/analysis/2008-008/analysis.txt
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/47744
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/495674/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30797
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2382
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2427
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44634
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44642
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html
Impacted products
Vendor Product Version
xine xine *
xine xine 0.9.13
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1
xine xine 1.0
xine xine 1.0.1
xine xine 1.0.2
xine xine 1.0.3a
xine xine 1.1.0
xine xine 1.1.1
xine xine 1.1.2
xine xine 1.1.3
xine xine 1.1.4
xine xine 1.1.10.1
xine xine 1.1.11
xine xine 1.1.11.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52E2289A-767D-445B-8AF5-4201E3806F78",
              "versionEndIncluding": "1.1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "56DE52C9-2381-483F-956D-C83503EBA664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "A119AB14-EDB5-4C79-9058-60E610636728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "44C4B2D6-DBAE-46CF-BE49-FC221B340726",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "197D04B5-8053-484F-A070-894BC9611C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "B2B22E87-6736-4C5B-A1A6-A3EA0064C10D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "4F2CD2BA-DFFD-4A9C-8B09-4793BB723717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "B993E680-B4FE-4DE5-800C-1E6B7C44849A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "F7100421-9BF9-4A07-AD54-C3D9CDCFBF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D6BE4F65-E942-4259-94E3-95E7F95B2E9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "4DCD596C-B080-4A98-BF14-57DDC370CCEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "4272CD6A-E384-4035-A09A-C63927191CC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "1D5828FA-6320-4983-AA70-ADFE9B475EAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "6E12B75F-1820-42F9-8B7C-3024D5C37B02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:*",
              "matchCriteriaId": "31B68858-0176-4CB0-B015-256EC1796D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "41844D73-EE25-4835-A9C5-08AADDA2CE62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "52EFFE9E-6A25-4A27-B483-96AA4A7C7660",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FCB9BA4F-0814-45C4-93C8-04DBFF8FC8D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:*",
              "matchCriteriaId": "8D49B22F-8C56-4842-8DE7-36011523E150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:*",
              "matchCriteriaId": "4B643DB4-63D2-4BA1-89B4-2EF813771718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:*",
              "matchCriteriaId": "C4FC619B-E611-4996-A12B-37830FD5B91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "61D3DB46-02A6-4D63-B052-2458FB181DD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:*",
              "matchCriteriaId": "5083B06C-C9B2-4011-B8B0-23FECE2DD100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "A03425FA-BB45-4FF4-B551-2A63129BDFC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:*",
              "matchCriteriaId": "A9B68EA2-EBCA-4272-B43E-9C2916447869",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "C609073D-30DF-42BF-B515-773205601FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:*",
              "matchCriteriaId": "DD535324-2B5B-4535-A33B-29487F8FA4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "234EF75C-C5AA-4FAA-85C7-77EFBB35AF61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AB02215-E511-4974-8AE3-834CAE630D54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "449D32E9-C204-4429-8DE5-9677BEC1DEFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AC157F9-D90C-4457-A17B-A4DB52E92855",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "856C23D9-14FC-4264-B85B-1E0D67FA73B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "89C1C896-C115-451D-840A-2DE3430B6D99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "464603A5-ECBE-486A-BFC9-921D0B4D39D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0A1D4E-A0C5-4063-A354-1D8782A89A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2A24E4-CB4A-4D71-804F-63DA24563D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FB6DB2-E29D-48E2-A092-B9D99230C383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "06E97F97-F3E4-48F8-BC24-E88AF98B93A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCA9DB3-5F48-4078-84D2-CC65E04058F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c.  NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basados en mont\u00edculo en xine-lib v1.1.12 y otra v1.1.15 y versiones anteriores , permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de vectores relacionados con (1) un tama\u00f1o manipulado del elemento EBML procesado por la funci\u00f3n parse_block_group en demux_matroska.c; (2) una determinada combinaci\u00f3n de los valores \"sps\", \"w\" y \"h\" procesados por las funciones real_parse_audio_specific_data y demux_real_send_chunk functions en demux_real.c y (3) una combinaci\u00f3n no especificada de tres valores procesados por la funci\u00f3n open_ra_file en demux_realaudio.c. NOTA: Al parecer el vector 2 existe por una reparaci\u00f3n incompleta en la v1.1.15."
    }
  ],
  "id": "CVE-2008-5236",
  "lastModified": "2024-11-21T00:53:37.703",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-11-26T01:30:00.517",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31502"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31567"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31827"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33544"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4648"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=619869"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ocert.org/analysis/2008-008/analysis.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/47744"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30797"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2382"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2427"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44634"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44642"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31502"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31567"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33544"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=619869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ocert.org/analysis/2008-008/analysis.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/47744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/495674/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2382"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44634"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.