First published: Thu Apr 16 2009(Updated: )
Integer signedness error in DivX Web Player 1.4.2.7, and possibly earlier versions, allows remote attackers to execute arbitrary code via a DivX file containing a crafted Stream Format (STRF) chunk, which triggers a heap-based buffer overflow.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
DivX Web Player | =1.1 | |
DivX Web Player | =1.3.1 | |
DivX Web Player | =1.3.0 | |
DivX Web Player | =1.4 | |
DivX Web Player | =1.4.0-beta2 | |
DivX Web Player | =1.3 | |
DivX Web Player | =1.0.2 | |
DivX Web Player | =1.1.0 | |
DivX Web Player | =1.4.2-beta2 | |
DivX Web Player | =1.4.1-beta1 | |
DivX Web Player | <=1.4.2.7 | |
DivX Web Player | =1.2.0 | |
DivX Web Player | =1.2 | |
DivX Web Player | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5259 is classified as a high-severity vulnerability due to its potential to allow remote arbitrary code execution.
To fix CVE-2008-5259, upgrade to the latest version of DivX Web Player that is not affected by this vulnerability.
CVE-2008-5259 allows remote attackers to execute arbitrary code, which can compromise the integrity and security of affected systems.
CVE-2008-5259 affects all versions of DivX Web Player up to and including 1.4.2.7.
Yes, CVE-2008-5259 is a well-documented and recognized vulnerability that has been publicly disclosed.