Vulnerabilities > CVE-2004-1300 - Unspecified vulnerability in Xine Xine-Lib 1Rc7

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
xine
critical
nessus
exploit available

Summary

Buffer overflow in the open_aiff_file function in demux_aiff.c for xine-lib (libxine) 1-rc7 allows remote attackers to execute arbitrary code via a crafted AIFF file.

Vulnerable Configurations

Part Description Count
Application
Xine
1

Exploit-Db

descriptionXine-Lib 0.9/1 Remote Client-Side Buffer Overflow Vulnerability. CVE-2004-1300. Remote exploit for linux platform
idEDB-ID:24978
last seen2016-02-03
modified2004-12-16
published2004-12-16
reporterAriel Berkman
sourcehttps://www.exploit-db.com/download/24978/
titleXine-Lib 0.9/1 - Remote Client-Side Buffer Overflow Vulnerability

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_64C8CC2A59B111D98A99000C6E8F12EF.NASL
    descriptionDue to a buffer overflow in the open_aiff_file function in demux_aiff.c, a remote attacker is able to execute arbitrary code via a modified AIFF file.
    last seen2020-06-01
    modified2020-06-02
    plugin id18962
    published2005-07-13
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/18962
    titleFreeBSD : libxine -- buffer-overflow vulnerability in aiff support (64c8cc2a-59b1-11d9-8a99-000c6e8f12ef)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200501-07.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200501-07 (xine-lib: Multiple overflows) Ariel Berkman discovered that xine-lib reads specific input data into an array without checking the input size in demux_aiff.c, making it vulnerable to a buffer overflow (CAN-2004-1300) . iDefense discovered that the PNA_TAG handling code in pnm_get_chunk() does not check if the input size is larger than the buffer size (CAN-2004-1187). iDefense also discovered that in this same function, a negative value could be given to an unsigned variable that specifies the read length of input data (CAN-2004-1188). Impact : A remote attacker could craft a malicious movie or convince a targeted user to connect to a malicious PNM server, which could result in the execution of arbitrary code with the rights of the user running any xine-lib frontend. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id16398
    published2005-02-14
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16398
    titleGLSA-200501-07 : xine-lib: Multiple overflows
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-011.NASL
    descriptioniDefense discovered that the PNA_TAG handling code in pnm_get_chunk() does not check if the input size is larger than the buffer size (CVE-2004-1187). As well, they discovered that in this same function, a negative value could be given to an unsigned variable that specifies the read length of input data (CVE-2004-1188). Ariel Berkman discovered that xine-lib reads specific input data into an array without checking the input size making it vulnerable to a buffer overflow problem (CVE-2004-1300). The updated packages have been patched to prevent these problems.
    last seen2020-06-01
    modified2020-06-02
    plugin id16220
    published2005-01-19
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16220
    titleMandrake Linux Security Advisory : xine-lib (MDKSA-2005:011)