7.5 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
73.9%
Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.
lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
secunia.com/advisories/28694
secunia.com/advisories/29392
secunia.com/advisories/29472
secunia.com/advisories/29503
secunia.com/advisories/29578
secunia.com/advisories/29601
secunia.com/advisories/29740
secunia.com/advisories/29766
secunia.com/advisories/29800
secunia.com/advisories/30581
secunia.com/advisories/31372
secunia.com/advisories/31393
secunia.com/secunia_research/2008-10/
security.gentoo.org/glsa/glsa-200804-25.xml
security.gentoo.org/glsa/glsa-200808-01.xml
sourceforge.net/project/shownotes.php?release_id=585488&group_id=9655
wiki.videolan.org/Changelog/0.8.6f
www.debian.org/security/2008/dsa-1536
www.debian.org/security/2008/dsa-1543
www.mandriva.com/security/advisories?name=MDVSA-2008:178
www.mandriva.com/security/advisories?name=MDVSA-2008:219
www.securityfocus.com/bid/28312
www.securitytracker.com/id?1019682
www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.392408
www.ubuntu.com/usn/usn-635-1
www.videolan.org/security/sa0803.php
www.vupen.com/english/advisories/2008/0923
www.vupen.com/english/advisories/2008/0985
xinehq.de/index.php/news
exchange.xforce.ibmcloud.com/vulnerabilities/41339
www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html
www.redhat.com/archives/fedora-package-announce/2008-March/msg00456.html