CVE-2006-2200

Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374577
http://secunia.com/advisories/20749 Vendor Advisory
http://secunia.com/advisories/20948 Vendor Advisory
http://secunia.com/advisories/20964 Vendor Advisory
http://secunia.com/advisories/21023 Vendor Advisory
http://secunia.com/advisories/21036 Vendor Advisory
http://secunia.com/advisories/21139 Vendor Advisory
http://secunia.com/advisories/23218 Vendor Advisory
http://secunia.com/advisories/23512 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200607-07.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
http://sourceforge.net/project/shownotes.php?release_id=468432
http://www.mandriva.com/security/advisories?name=MDKSA-2006:117
http://www.mandriva.com/security/advisories?name=MDKSA-2006:121
http://www.securityfocus.com/bid/18608
http://www.ubuntu.com/usn/usn-309-1
http://www.ubuntu.com/usn/usn-315-1
http://www.vupen.com/english/advisories/2006/2487 Vendor Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374577
http://secunia.com/advisories/20749 Vendor Advisory
http://secunia.com/advisories/20948 Vendor Advisory
http://secunia.com/advisories/20964 Vendor Advisory
http://secunia.com/advisories/21023 Vendor Advisory
http://secunia.com/advisories/21036 Vendor Advisory
http://secunia.com/advisories/21139 Vendor Advisory
http://secunia.com/advisories/23218 Vendor Advisory
http://secunia.com/advisories/23512 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200607-07.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
http://sourceforge.net/project/shownotes.php?release_id=468432
http://www.mandriva.com/security/advisories?name=MDKSA-2006:117
http://www.mandriva.com/security/advisories?name=MDKSA-2006:121
http://www.securityfocus.com/bid/18608
http://www.ubuntu.com/usn/usn-309-1
http://www.ubuntu.com/usn/usn-315-1
http://www.vupen.com/english/advisories/2006/2487 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mimms:mimms:0.0.9:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374577 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374577 -
References () http://secunia.com/advisories/20749 - Vendor Advisory () http://secunia.com/advisories/20749 - Vendor Advisory
References () http://secunia.com/advisories/20948 - Vendor Advisory () http://secunia.com/advisories/20948 - Vendor Advisory
References () http://secunia.com/advisories/20964 - Vendor Advisory () http://secunia.com/advisories/20964 - Vendor Advisory
References () http://secunia.com/advisories/21023 - Vendor Advisory () http://secunia.com/advisories/21023 - Vendor Advisory
References () http://secunia.com/advisories/21036 - Vendor Advisory () http://secunia.com/advisories/21036 - Vendor Advisory
References () http://secunia.com/advisories/21139 - Vendor Advisory () http://secunia.com/advisories/21139 - Vendor Advisory
References () http://secunia.com/advisories/23218 - Vendor Advisory () http://secunia.com/advisories/23218 - Vendor Advisory
References () http://secunia.com/advisories/23512 - Vendor Advisory () http://secunia.com/advisories/23512 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200607-07.xml - () http://security.gentoo.org/glsa/glsa-200607-07.xml -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842 -
References () http://sourceforge.net/project/shownotes.php?release_id=468432 - () http://sourceforge.net/project/shownotes.php?release_id=468432 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:117 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:117 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:121 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:121 -
References () http://www.securityfocus.com/bid/18608 - () http://www.securityfocus.com/bid/18608 -
References () http://www.ubuntu.com/usn/usn-309-1 - () http://www.ubuntu.com/usn/usn-309-1 -
References () http://www.ubuntu.com/usn/usn-315-1 - () http://www.ubuntu.com/usn/usn-315-1 -
References () http://www.vupen.com/english/advisories/2006/2487 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2487 - Vendor Advisory

Information

Published : 2006-06-28 01:45

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2200

Mitre link : CVE-2006-2200

CVE.ORG link : CVE-2006-2200


JSON object : View

Products Affected

mimms

  • mimms

xine

  • xine-lib
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer