Xine

Xine-lib

38 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 4.84%
  • Veröffentlicht 08.04.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a ...

  • EPSS 2.44%
  • Veröffentlicht 23.02.2009 15:30:04
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib 1.1.16.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a 4X movie file with a large current_track value, a similar issue to ...

  • EPSS 1.05%
  • Veröffentlicht 26.11.2008 01:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not validate the count field before calling calloc for STSD_ATOM atom allocation, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitr...

  • EPSS 1.41%
  • Veröffentlicht 26.11.2008 01:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

xine-lib 1.1.12, and other versions before 1.1.15, does not check for failure of malloc in circumstances including (1) the mymng_process_header function in demux_mng.c, (2) the open_mod_file function in demux_mod.c, and (3) frame_buffer allocation in...

  • EPSS 5.52%
  • Veröffentlicht 26.11.2008 01:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt....

  • EPSS 2.07%
  • Veröffentlicht 26.11.2008 01:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not properly handle (a) negative and (b) zero values during unspecified read function calls in input_file.c, input_net.c, input_smb.c, and input_http.c, which allows remote attackers to cau...

  • EPSS 3.05%
  • Veröffentlicht 26.11.2008 01:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and...

  • EPSS 1.34%
  • Veröffentlicht 26.11.2008 01:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer underflow in demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allows remote attackers to cause a denial of service (crash) via a crafted media file that results in a small value of moov_atom_size in a compressed MOV (aka ...

  • EPSS 1.37%
  • Veröffentlicht 26.11.2008 01:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (cr...

  • EPSS 0.44%
  • Veröffentlicht 26.11.2008 01:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in xine-lib before 1.1.15 has unknown impact and attack vectors related to libfaad. NOTE: due to the lack of details, it is not clear whether this is an issue in xine-lib or in libfaad.