CVE-2008-5238
Published: 26 November 2008
Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.
Priority
Status
Package | Release | Status |
---|---|---|
xine-lib Launchpad, Ubuntu, Debian |
upstream |
Released
(1.1.15)
|
dapper |
Released
(1.1.1+ubuntu2-7.10)
|
|
gutsy |
Released
(1.1.7-1ubuntu1.4)
|
|
hardy |
Released
(1.1.11.1-1ubuntu3.2)
|
|
intrepid |
Not vulnerable
(1.1.15-0ubuntu1)
|
|
Patches: upstream: http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=a0830dddbd35625069506a9c49321317cbab8a2d;style=gitweb |