First published: Wed Nov 26 2008(Updated: )
xine-lib 1.1.12, and other versions before 1.1.15, does not check for failure of malloc in circumstances including (1) the mymng_process_header function in demux_mng.c, (2) the open_mod_file function in demux_mod.c, and (3) frame_buffer allocation in the real_parse_audio_specific_data function in demux_real.c, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted media file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
xine | =1.1.10 | |
xine | =1-rc3a | |
xine | =1.1.10.1 | |
xine | =1.1.9.1 | |
xine | =1_beta7 | |
xine | =1.1.11 | |
xine | =1-rc3 | |
xine | =1_beta9 | |
xine | =1.1.0 | |
xine | =1.1.7 | |
xine | =1-rc3b | |
xine | =1-rc5 | |
xine | =1.1.2 | |
xine | =1_beta4 | |
xine | =1.1.9 | |
xine | =1.0.3a | |
xine | =1-rc4a | |
xine | =1.1.12 | |
xine | =1.0.1 | |
xine | =1-rc8 | |
xine | =1.1.13 | |
xine | =1.1.11.1 | |
xine | =1-rc2 | |
xine | =1.0.2 | |
xine | =1.1.8 | |
xine | =1_beta2 | |
xine | =1-rc7 | |
xine | =1_beta5 | |
xine | =1_beta11 | |
xine | =1-rc1 | |
xine | =1.1.3 | |
xine | <=1.1.14 | |
xine | =1.1.4 | |
xine | =1.1.5 | |
xine | =0.9.13 | |
xine | =1.0 | |
xine | =1-rc3c | |
xine | =1_beta6 | |
xine | =1-rc4 | |
xine | =1_beta1 | |
xine | =1.1.6 | |
xine | =1_beta12 | |
xine | =1.1.1 | |
xine | =1_beta10 | |
xine | =1_beta8 | |
xine | =1-rc0a | |
xine | =1-rc6a | |
xine | =1_beta3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5233 has a moderate severity rating due to potential memory allocation issues that could lead to application crashes.
To fix CVE-2008-5233, upgrade xine-lib to version 1.1.15 or later, as these versions include the necessary bug fixes.
CVE-2008-5233 affects xine-lib versions from 1.1.12 and earlier, including specific versions such as 1.1.10, 1.1.11, and earlier releases.
CVE-2008-5233 may lead to application instability or crashes, potentially affecting overall system performance when using the affected xine-lib versions.
There are no specific workarounds for CVE-2008-5233; it is recommended to upgrade to the fixed version at the earliest opportunity.