First published: Fri Dec 31 2004(Updated: )
Multiple stack-based buffer overflows in xine-lib 1-rc2 through 1-rc5 allow attackers to execute arbitrary code via (1) long VideoCD vcd:// MRLs or (2) long subtitle lines.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
xine | =0.9.18 | |
xine | =1_rc3 | |
xine | =1_rc4 | |
xine | =1_rc5 | |
xine | =1_rc2 | |
xine | =1_rc2 | |
xine | =1_rc5 | |
xine | =0.99 | |
xine | =1_rc3 | |
xine | =1_rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1475 is classified as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2004-1475, upgrade xine and xine-lib to versions 0.99 or later.
CVE-2004-1475 can be exploited through crafted VideoCD MRLs or long subtitle lines.
CVE-2004-1475 affects xine versions 1-rc2 through 1-rc5 and 0.9.18.
The consequences of CVE-2004-1475 include the possibility of remote attackers executing arbitrary code on a vulnerable system.