9.3

CVE-2008-5236

Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c.  NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
XineXine Version <= 1.1.5
XineXine Version0.9.13
XineXine Version1 Updatebeta1
XineXine Version1 Updatebeta10
XineXine Version1 Updatebeta11
XineXine Version1 Updatebeta12
XineXine Version1 Updatebeta2
XineXine Version1 Updatebeta3
XineXine Version1 Updatebeta4
XineXine Version1 Updatebeta5
XineXine Version1 Updatebeta6
XineXine Version1 Updatebeta7
XineXine Version1 Updatebeta8
XineXine Version1 Updatebeta9
XineXine Version1 Updaterc0a
XineXine Version1 Updaterc1
XineXine Version1 Updaterc2
XineXine Version1 Updaterc3
XineXine Version1 Updaterc3a
XineXine Version1 Updaterc3b
XineXine Version1 Updaterc3c
XineXine Version1 Updaterc4
XineXine Version1 Updaterc4a
XineXine Version1 Updaterc5
XineXine Version1 Updaterc6a
XineXine Version1 Updaterc7
XineXine Version1 Updaterc8
XineXine Version1.0
XineXine Version1.0.1
XineXine Version1.0.2
XineXine Version1.0.3a
XineXine Version1.1.0
XineXine Version1.1.1
XineXine Version1.1.2
XineXine Version1.1.3
XineXine Version1.1.4
XineXine Version1.1.10.1
XineXine Version1.1.11
XineXine Version1.1.11.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 5.52% 0.892
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.