The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21 - | |
References | () http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:011 - | |
References | () http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18638 - |
Information
Published : 2005-01-10 05:00
Updated : 2024-11-20 23:50
NVD link : CVE-2004-1188
Mitre link : CVE-2004-1188
CVE.ORG link : CVE-2004-1188
JSON object : View
Products Affected
xine
- xine
- xine-lib
mandrakesoft
- mandrake_linux
mplayer
- mplayer
CWE