First published: Tue Jan 08 2008(Updated: )
Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute in an RTSP session, related to the rmff_dump_header function and related to disregarding the max field. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
xine | <=1.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0225 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2008-0225, upgrade to a newer version of xine-lib that has addressed this buffer overflow issue.
CVE-2008-0225 affects xine-lib versions 1.1.9 and earlier.
Yes, CVE-2008-0225 can be exploited remotely during an RTSP session.
The impact of CVE-2008-0225 includes potential execution of arbitrary code on the affected system.