First published: Mon Mar 24 2008(Updated: )
Multiple integer overflows in xine-lib 1.1.11 and earlier allow remote attackers to trigger heap-based buffer overflows and possibly execute arbitrary code via (1) a crafted .FLV file, which triggers an overflow in demuxers/demux_flv.c; (2) a crafted .MOV file, which triggers an overflow in demuxers/demux_qt.c; (3) a crafted .RM file, which triggers an overflow in demuxers/demux_real.c; (4) a crafted .MVE file, which triggers an overflow in demuxers/demux_wc3movie.c; (5) a crafted .MKV file, which triggers an overflow in demuxers/ebml.c; or (6) a crafted .CAK file, which triggers an overflow in demuxers/demux_film.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/1.1.11.1 | <1. | 1. |
xine | =1.1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1482 has a high severity due to the potential for remote code execution through heap-based buffer overflows.
To fix CVE-2008-1482, update xine-lib to version 1.1.11.1 or later to address the integer overflow issues.
CVE-2008-1482 affects xine-lib versions 1.1.11 and earlier.
CVE-2008-1482 can be exploited using crafted .FLV and .MOV files that trigger buffer overflows.
Users and applications utilizing xine-lib versions 1.1.11 and earlier are at risk of exploitation through malicious media files.