First published: Wed Jun 28 2006(Updated: )
Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
xine | =1.1.0 | |
Mimms | =0.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2200 has a high severity due to the potential for remote code execution and denial of service.
To fix CVE-2006-2200, update to the latest versions of xine-lib (greater than 1.1.0) and MiMMS (greater than 0.0.9) that contain the security patches.
CVE-2006-2200 affects xine-lib version 1.1.0 and MiMMS version 0.0.9.
CVE-2006-2200 is a stack-based buffer overflow vulnerability.
CVE-2006-2200 primarily allows for application crashes and potential remote code execution, which could result in data loss.