| Title | xine-lib におけるヒープベースのバッファオーバーフローの脆弱性 |
|---|---|
| Summary | xine-lib は、(1) demux_qt.c の parse_moov_atom 関数が実行する巧妙に細工されたメタデータの atom サイズ、および (2) id3.c の id3v23_interp_frame 関数のフレーム読み込みに関する処理に不備があるため、ヒープベースのバッファオーバーフローの脆弱性が存在します。 |
| Possible impacts | 第三者により、任意のコードを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Sept. 10, 2008, midnight |
| Registration Date | Dec. 20, 2012, 6:52 p.m. |
| Last Update | Dec. 20, 2012, 6:52 p.m. |
| CVSS2.0 : 危険 | |
| Score | 9.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
| Xine |
| xine-lib 1.1.12 および 1.1.15 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2012年12月20日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c. NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15. |
|---|---|
| Summary | http://secunia.com/advisories/31502 1) Multiple integer overflows exist within the processing of ID3 tags in src/demuxers/id3.c. These can be exploited to cause heap-based buffer overflows via overly large ID3 frame header size fields. 2) Multiple boundary errors exist within the "demux_real_send_chunk()" function in src/demuxers/demux_real.c. These can potentially be exploited to cause heap-based buffer overflows via specially crafted Real Media files. 3) A boundary error exists within the "open_video_capture_device()" function in src/input/input_v4l.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted V4L stream. 4) A boundary error exists within the "parse_moov_atom()" function in src/demuxers/demux_qt.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted Quicktime file. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in versions prior to 1.1.15. |
| Summary | http://secunia.com/advisories/31502 Solution: |
| Publication Date | Nov. 26, 2008, 10:30 a.m. |
| Registration Date | Jan. 29, 2021, 1:45 p.m. |
| Last Update | Oct. 12, 2018, 5:54 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:* | 1.1.14 | ||||
| cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:* | |||||