Vulnerabilities > Xine > Xine LIB > 1.beta11

DATE CVE VULNERABILITY TITLE RISK
2008-11-26 CVE-2008-5248 Improper Input Validation vulnerability in Xine Xine-Lib
xine-lib before 1.1.15 allows remote attackers to cause a denial of service (crash) via "MP3 files with metadata consisting only of separators."
network
xine CWE-20
4.3
2008-11-26 CVE-2008-5247 Numeric Errors vulnerability in Xine Xine-Lib
The real_parse_audio_specific_data function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, uses an untrusted height (aka codec_data_length) value as a divisor, which allow remote attackers to cause a denial of service (divide-by-zero error and crash) via a zero value.
network
xine CWE-189
4.3
2008-11-26 CVE-2008-5246 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Xine Xine-Lib
Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c.
network
xine CWE-119
critical
9.3
2008-11-26 CVE-2008-5245 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Xine Xine-Lib
xine-lib before 1.1.15 performs V4L video frame preallocation before ascertaining the required length, which has unknown impact and attack vectors, possibly related to a buffer overflow in the open_video_capture_device function in src/input/input_v4l.c.
network
xine CWE-119
critical
9.3
2008-11-26 CVE-2008-5244 Remote Security vulnerability in xine-lib
Unspecified vulnerability in xine-lib before 1.1.15 has unknown impact and attack vectors related to libfaad.
network
low complexity
xine
critical
10.0
2008-11-26 CVE-2008-5243 Improper Input Validation vulnerability in Xine Xine-Lib
The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error.
network
xine CWE-20
4.3
2008-11-26 CVE-2008-5242 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Xine Xine-Lib
demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not validate the count field before calling calloc for STSD_ATOM atom allocation, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted media file.
network
xine CWE-119
6.8
2008-11-26 CVE-2008-5241 Numeric Errors vulnerability in Xine Xine-Lib
Integer underflow in demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allows remote attackers to cause a denial of service (crash) via a crafted media file that results in a small value of moov_atom_size in a compressed MOV (aka CMOV_ATOM).
network
xine CWE-189
4.3
2008-11-26 CVE-2008-5240 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Xine Xine-Lib
xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.
network
xine CWE-119
4.3
2008-11-26 CVE-2008-5239 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Xine Xine-Lib
xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not properly handle (a) negative and (b) zero values during unspecified read function calls in input_file.c, input_net.c, input_smb.c, and input_http.c, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via vectors such as (1) a file or (2) an HTTP response, which triggers consequences such as out-of-bounds reads and heap-based buffer overflows.
network
xine CWE-119
4.3