4.3

CVE-2008-5240

xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
XineXine-lib Version <= 1.1.15
XineXine-lib Version0.9.13
XineXine-lib Version1 Updaterc0a
XineXine-lib Version1 Updaterc1
XineXine-lib Version1 Updaterc2
XineXine-lib Version1 Updaterc3
XineXine-lib Version1 Updaterc3a
XineXine-lib Version1 Updaterc3b
XineXine-lib Version1 Updaterc3c
XineXine-lib Version1 Updaterc4
XineXine-lib Version1 Updaterc4a
XineXine-lib Version1 Updaterc5
XineXine-lib Version1 Updaterc6a
XineXine-lib Version1 Updaterc7
XineXine-lib Version1 Updaterc8
XineXine-lib Version1.0
XineXine-lib Version1.0.1
XineXine-lib Version1.0.2
XineXine-lib Version1.0.3a
XineXine-lib Version1.1.0
XineXine-lib Version1.1.1
XineXine-lib Version1.1.2
XineXine-lib Version1.1.3
XineXine-lib Version1.1.4
XineXine-lib Version1.1.5
XineXine-lib Version1.1.6
XineXine-lib Version1.1.7
XineXine-lib Version1.1.8
XineXine-lib Version1.1.9
XineXine-lib Version1.1.9.1
XineXine-lib Version1.1.10
XineXine-lib Version1.1.10.1
XineXine-lib Version1.1.11
XineXine-lib Version1.1.11.1
XineXine-lib Version1.1.12
XineXine-lib Version1.1.13
XineXine-lib Version1.1.14
XineXine-lib Version1_beta1
XineXine-lib Version1_beta2
XineXine-lib Version1_beta3
XineXine-lib Version1_beta4
XineXine-lib Version1_beta5
XineXine-lib Version1_beta6
XineXine-lib Version1_beta7
XineXine-lib Version1_beta8
XineXine-lib Version1_beta9
XineXine-lib Version1_beta10
XineXine-lib Version1_beta11
XineXine-lib Version1_beta12
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.05% 0.854
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.