{"id": "EDB-ID:27791", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "Xine 0.99.x - Filename Handling Remote Format String", "description": "", "published": "2006-05-01T00:00:00", "modified": "2006-05-01T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/27791", "reporter": "KaDaL-X", "references": [], "cvelist": ["2006-2230"], "immutableFields": [], "lastseen": "2022-08-16T08:39:25", "viewCount": 12, "enchantments": {"dependencies": {}, "score": {"value": -0.3, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.3}, "_state": {"dependencies": 1661190352, "score": 1661184847, "epss": 1678800746}, "_internal": {"score_hash": "b5c1816b94c22dda2840ec9912f7c16d"}, "sourceHref": "https://www.exploit-db.com/download/27791", "sourceData": "source: https://www.securityfocus.com/bid/17769/info\r\n\r\nThe xine package is susceptible to a remote format-string vulnerability. \r\n\r\nThis issue arises when the application handles specially crafted filenames. An attacker can exploit this vulnerability by crafting a malicious filename that contains format specifiers and then coercing unsuspecting users to try to execute the affected application with the malicious filename as an argument.\r\n\r\nA successful attack may crash the application or lead to arbitrary code execution. \r\n\r\nVersion 0.99.4 of xine is vulnerable to this issue; other versions may also be affected.\r\n\r\nThe following command is sufficient to demonstrate this issue:\r\nxine %p-%p.mp3\r\n\r\nThis will result in a file-not-found dialog being displayed. The dialog will report that the file that was not found has a name similar to '0x811ac8e-0xbe1fdabc.mp3'", "osvdbidlist": ["25606"], "exploitType": "dos", "verified": true}