Lucene search

K
nvd[email protected]NVD:CVE-2004-1188
HistoryJan 10, 2005 - 5:00 a.m.

CVE-2004-1188

2005-01-1005:00:00
web.nvd.nist.gov

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

AI Score

Confidence

Low

0.041 Low

EPSS

Percentile

92.2%

The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187.

Affected configurations

NVD
Node
mplayermplayerMatch0.90
OR
mplayermplayerMatch0.90_pre
OR
mplayermplayerMatch0.90_rc
OR
mplayermplayerMatch0.90_rc4
OR
mplayermplayerMatch0.91
OR
mplayermplayerMatch0.92
OR
mplayermplayerMatch0.92.1
OR
mplayermplayerMatch0.92_cvs
OR
mplayermplayerMatch1.0_pre1
OR
mplayermplayerMatch1.0_pre2
OR
mplayermplayerMatch1.0_pre3
OR
mplayermplayerMatch1.0_pre3try2
OR
mplayermplayerMatch1.0_pre4
OR
mplayermplayerMatch1.0_pre5
OR
mplayermplayerMatch1.0_pre5try1
OR
mplayermplayerMatch1.0_pre5try2
OR
mplayermplayerMatchhead_cvs
OR
xinexineMatch0.9.8
OR
xinexineMatch0.9.13
OR
xinexineMatch0.9.18
OR
xinexineMatch1_alpha
OR
xinexineMatch1_beta1
OR
xinexineMatch1_beta2
OR
xinexineMatch1_beta3
OR
xinexineMatch1_beta4
OR
xinexineMatch1_beta5
OR
xinexineMatch1_beta6
OR
xinexineMatch1_beta7
OR
xinexineMatch1_beta8
OR
xinexineMatch1_beta9
OR
xinexineMatch1_beta10
OR
xinexineMatch1_beta11
OR
xinexineMatch1_beta12
OR
xinexineMatch1_rc0
OR
xinexineMatch1_rc0a
OR
xinexineMatch1_rc1
OR
xinexineMatch1_rc2
OR
xinexineMatch1_rc3
OR
xinexineMatch1_rc3a
OR
xinexineMatch1_rc3b
OR
xinexineMatch1_rc4
OR
xinexineMatch1_rc5
OR
xinexineMatch1_rc6
OR
xinexineMatch1_rc6a
OR
xinexineMatch1_rc7
OR
xinexineMatch1_rc8
OR
xinexine-libMatch0.9.8
OR
xinexine-libMatch0.9.13
OR
xinexine-libMatch0.99
OR
xinexine-libMatch1_alpha
OR
xinexine-libMatch1_beta1
OR
xinexine-libMatch1_beta2
OR
xinexine-libMatch1_beta3
OR
xinexine-libMatch1_beta4
OR
xinexine-libMatch1_beta5
OR
xinexine-libMatch1_beta6
OR
xinexine-libMatch1_beta7
OR
xinexine-libMatch1_beta8
OR
xinexine-libMatch1_beta9
OR
xinexine-libMatch1_beta10
OR
xinexine-libMatch1_beta11
OR
xinexine-libMatch1_beta12
OR
xinexine-libMatch1_rc0
OR
xinexine-libMatch1_rc1
OR
xinexine-libMatch1_rc2
OR
xinexine-libMatch1_rc3
OR
xinexine-libMatch1_rc3a
OR
xinexine-libMatch1_rc3b
OR
xinexine-libMatch1_rc3c
OR
xinexine-libMatch1_rc4
OR
xinexine-libMatch1_rc5
OR
xinexine-libMatch1_rc6
OR
xinexine-libMatch1_rc6a
OR
xinexine-libMatch1_rc7
Node
mandrakesoftmandrake_linuxMatch10.0
OR
mandrakesoftmandrake_linuxMatch10.0amd64
OR
mandrakesoftmandrake_linuxMatch10.1
OR
mandrakesoftmandrake_linuxMatch10.1x86_64

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

AI Score

Confidence

Low

0.041 Low

EPSS

Percentile

92.2%