First published: Wed Jun 28 2006(Updated: )
Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
xine xine-lib | =1.1.0 | |
Mimms Mimms | =0.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.