First published: Fri Oct 14 2005(Updated: )
Format string vulnerability in input_cdda.c in xine-lib 1-beta through 1-beta 3, 1-rc, 1.0 through 1.0.2, and 1.1.1 allows remote servers to execute arbitrary code via format string specifiers in metadata in CDDB server responses when the victim plays a CD.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
xine | =1.1.0 | |
xine | =1.0.1 | |
xine | =1.0.2 | |
xine | =0.9.13 | |
xine | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2967 has a high severity level due to the potential for remote code execution.
To fix CVE-2005-2967, update the xine-lib to a patched version that is not affected by the format string vulnerability.
CVE-2005-2967 affects xine-lib versions 0.9.13 through 1.1.1, including specific versions like 1.0.1 and 1.0.2.
CVE-2005-2967 is classified as a format string vulnerability that allows for arbitrary code execution.
Attackers can exploit CVE-2005-2967 to execute arbitrary code on a victim's machine by crafting malicious metadata in CDDB server responses.