4.3

CVE-2008-1419

Exploit

Xiph.org libvorbis 1.2.0 and earlier does not properly handle a zero value for codebook.dim, which allows remote attackers to cause a denial of service (crash or infinite loop) or trigger an integer overflow.

Data is provided by the National Vulnerability Database (NVD)
Xiph.OrgLibvorbis Version1.0.0
   RedhatEnterprise Linux Version2.1 Editionas
   RedhatEnterprise Linux Version2.1 Editiones
   RedhatEnterprise Linux Version2.1 Editionws
   RedhatEnterprise Linux Version4.0
   RedhatEnterprise Linux Version5 Editionclient
   RedhatEnterprise Linux Version5 Editionclient_workstation
   RedhatEnterprise Linux Version5.0
   RedhatLinux Advanced Workstation Version2.1 Editionitanium
Xiph.OrgLibvorbis Version1.0.1
   RedhatEnterprise Linux Version2.1 Editionas
   RedhatEnterprise Linux Version2.1 Editiones
   RedhatEnterprise Linux Version2.1 Editionws
   RedhatEnterprise Linux Version4.0
   RedhatEnterprise Linux Version5 Editionclient
   RedhatEnterprise Linux Version5 Editionclient_workstation
   RedhatEnterprise Linux Version5.0
   RedhatLinux Advanced Workstation Version2.1 Editionitanium
Xiph.OrgLibvorbis Version1.1.0
   RedhatEnterprise Linux Version2.1 Editionas
   RedhatEnterprise Linux Version2.1 Editiones
   RedhatEnterprise Linux Version2.1 Editionws
   RedhatEnterprise Linux Version4.0
   RedhatEnterprise Linux Version5 Editionclient
   RedhatEnterprise Linux Version5 Editionclient_workstation
   RedhatEnterprise Linux Version5.0
   RedhatLinux Advanced Workstation Version2.1 Editionitanium
Xiph.OrgLibvorbis Version1.1.1
   RedhatEnterprise Linux Version2.1 Editionas
   RedhatEnterprise Linux Version2.1 Editiones
   RedhatEnterprise Linux Version2.1 Editionws
   RedhatEnterprise Linux Version4.0
   RedhatEnterprise Linux Version5 Editionclient
   RedhatEnterprise Linux Version5 Editionclient_workstation
   RedhatEnterprise Linux Version5.0
   RedhatLinux Advanced Workstation Version2.1 Editionitanium
Xiph.OrgLibvorbis Version1.2.0
   RedhatEnterprise Linux Version2.1 Editionas
   RedhatEnterprise Linux Version2.1 Editiones
   RedhatEnterprise Linux Version2.1 Editionws
   RedhatEnterprise Linux Version4.0
   RedhatEnterprise Linux Version5 Editionclient
   RedhatEnterprise Linux Version5 Editionclient_workstation
   RedhatEnterprise Linux Version5.0
   RedhatLinux Advanced Workstation Version2.1 Editionitanium
Xiph.OrgLibvorbis Version1.12
   RedhatEnterprise Linux Version2.1 Editionas
   RedhatEnterprise Linux Version2.1 Editiones
   RedhatEnterprise Linux Version2.1 Editionws
   RedhatEnterprise Linux Version4.0
   RedhatEnterprise Linux Version5 Editionclient
   RedhatEnterprise Linux Version5 Editionclient_workstation
   RedhatEnterprise Linux Version5.0
   RedhatLinux Advanced Workstation Version2.1 Editionitanium
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 13.14% 0.939
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

http://secunia.com/advisories/30581
Third Party Advisory
Permissions Required
http://secunia.com/advisories/30234
Third Party Advisory
Permissions Required
http://secunia.com/advisories/30237
Third Party Advisory
Permissions Required
http://secunia.com/advisories/30247
Third Party Advisory
Permissions Required
http://secunia.com/advisories/30259
Third Party Advisory
Permissions Required
http://secunia.com/advisories/30479
Third Party Advisory
Permissions Required
http://secunia.com/advisories/30820
Third Party Advisory
Permissions Required
http://secunia.com/advisories/32946
Third Party Advisory
Permissions Required
http://www.securityfocus.com/bid/29206
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1020029
Third Party Advisory
VDB Entry