First published: Mon Jan 14 2008(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2008-0225">CVE-2008-0225</a> to the following vulnerability: Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute, related to the rmff_dump_header function and related to disregarding the max field. NOTE: some of these details are obtained from third party information. References: <a href="http://aluigi.altervista.org/adv/xinermffhof-adv.txt">http://aluigi.altervista.org/adv/xinermffhof-adv.txt</a> <a href="http://secunia.com/advisories/28384">http://secunia.com/advisories/28384</a>
Affected Software | Affected Version | How to fix |
---|---|---|
xine | <1.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-428620 is classified as high due to the potential for remote code execution.
To fix REDHAT-BUG-428620, update xine-lib to a version later than 1.1.9.
All versions of xine-lib up to and including 1.1.9 are affected by REDHAT-BUG-428620.
The vulnerability in REDHAT-BUG-428620 is caused by a heap-based buffer overflow in the rmff_dump_cont function.
Yes, REDHAT-BUG-428620 can be exploited remotely, allowing an attacker to execute arbitrary code.