CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
Low
EPSS
Percentile
95.4%
Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow.
Vendor | Product | Version | CPE |
---|---|---|---|
xine | xine-lib | 1.1.0 | cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:* |
xine | xine-lib | 1.1.1 | cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:* |
xine | xine-lib | 1.1.10 | cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:* |
xine | xine-lib | 1.1.10.1 | cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:* |
xine | xine-lib | 1.1.11 | cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:* |
xine | xine-lib | 1.1.11.1 | cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:* |
xine | xine-lib | 1.1.12 | cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:* |
xine | xine-lib | 1.1.13 | cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:* |
xine | xine-lib | 1.1.14 | cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:* |
xine | xine-lib | 1.1.15 | cpe:2.3:a:xine:xine-lib:1.1.15:*:*:*:*:*:*:* |
bugs.xine-project.org/show_bug.cgi?id=224
lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
osvdb.org/53288
secunia.com/advisories/34593
secunia.com/advisories/34712
secunia.com/advisories/35416
sourceforge.net/project/shownotes.php?group_id=9655&release_id=673233
www.mandriva.com/security/advisories?name=MDVSA-2009:298
www.mandriva.com/security/advisories?name=MDVSA-2009:299
www.securityfocus.com/archive/1/502481/100/0/threaded
www.securityfocus.com/bid/34384
www.securitytracker.com/id?1021989
www.trapkit.de/advisories/TKADV2009-005.txt
www.vupen.com/english/advisories/2009/0937
exchange.xforce.ibmcloud.com/vulnerabilities/49714
www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html
www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html