First published: Sat Jun 03 2006(Updated: )
Buffer overflow in the HTTP Plugin (xineplug_inp_http.so) for xine-lib 1.1.1 allows remote attackers to cause a denial of service (application crash) via a long reply from an HTTP server, as demonstrated using gxine 0.5.6.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
xine | =1.1.0 | |
xine | =1.0.1 | |
Xine | =0.5.6 | |
xine | =1.0.2 | |
xine | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2802 is classified as a high severity vulnerability due to its potential to cause a denial of service through a remote attack.
To remediate CVE-2006-2802, upgrade xine-lib to version 1.1.2 or later, as this version addresses the buffer overflow issue.
CVE-2006-2802 affects xine-lib versions 1.0.1, 1.0.2, and 1.1.0, as well as gxine version 0.5.6.
Yes, CVE-2006-2802 can be exploited remotely by attackers by sending specially crafted HTTP responses.
The impact of CVE-2006-2802 is that it can lead to an application crash, which results in a denial of service for users.