First published: Wed Nov 26 2008(Updated: )
Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
xine | <=1.1.14 | |
xine | =0.9.13 | |
xine | =1-rc0a | |
xine | =1-rc1 | |
xine | =1-rc2 | |
xine | =1-rc3 | |
xine | =1-rc3a | |
xine | =1-rc3b | |
xine | =1-rc3c | |
xine | =1-rc4 | |
xine | =1-rc4a | |
xine | =1-rc5 | |
xine | =1-rc6a | |
xine | =1-rc7 | |
xine | =1-rc8 | |
xine | =1.0 | |
xine | =1.0.1 | |
xine | =1.0.2 | |
xine | =1.0.3a | |
xine | =1.1.0 | |
xine | =1.1.1 | |
xine | =1.1.2 | |
xine | =1.1.3 | |
xine | =1.1.4 | |
xine | =1.1.5 | |
xine | =1.1.6 | |
xine | =1.1.7 | |
xine | =1.1.8 | |
xine | =1.1.9 | |
xine | =1.1.9.1 | |
xine | =1.1.10 | |
xine | =1.1.10.1 | |
xine | =1.1.11 | |
xine | =1.1.11.1 | |
xine | =1.1.12 | |
xine | =1.1.13 | |
xine | =1_beta1 | |
xine | =1_beta2 | |
xine | =1_beta3 | |
xine | =1_beta4 | |
xine | =1_beta5 | |
xine | =1_beta6 | |
xine | =1_beta7 | |
xine | =1_beta8 | |
xine | =1_beta9 | |
xine | =1_beta10 | |
xine | =1_beta11 | |
xine | =1_beta12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5246 has a high severity rating due to its potential to allow remote code execution.
To fix CVE-2008-5246, update xine-lib to version 1.1.15 or later.
CVE-2008-5246 affects xine-lib versions prior to 1.1.15, including versions 1.1.10 and earlier.
Attackers can execute arbitrary code on the affected system through specially crafted ID3 data.
Yes, there are known exploits that leverage the buffer overflow vulnerabilities in CVE-2008-5246.