CVE-2008-0073

Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
http://secunia.com/advisories/28694 Vendor Advisory
http://secunia.com/advisories/29392
http://secunia.com/advisories/29472
http://secunia.com/advisories/29503
http://secunia.com/advisories/29578
http://secunia.com/advisories/29601
http://secunia.com/advisories/29740
http://secunia.com/advisories/29766
http://secunia.com/advisories/29800
http://secunia.com/advisories/30581
http://secunia.com/advisories/31372
http://secunia.com/advisories/31393
http://secunia.com/secunia_research/2008-10/ Vendor Advisory
http://security.gentoo.org/glsa/glsa-200804-25.xml
http://security.gentoo.org/glsa/glsa-200808-01.xml
http://sourceforge.net/project/shownotes.php?release_id=585488&group_id=9655 Patch
http://wiki.videolan.org/Changelog/0.8.6f
http://www.debian.org/security/2008/dsa-1536
http://www.debian.org/security/2008/dsa-1543
http://www.mandriva.com/security/advisories?name=MDVSA-2008:178
http://www.mandriva.com/security/advisories?name=MDVSA-2008:219
http://www.securityfocus.com/bid/28312
http://www.securitytracker.com/id?1019682
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.392408
http://www.ubuntu.com/usn/usn-635-1
http://www.videolan.org/security/sa0803.php
http://www.vupen.com/english/advisories/2008/0923
http://www.vupen.com/english/advisories/2008/0985
http://xinehq.de/index.php/news Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/41339
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00456.html
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
http://secunia.com/advisories/28694 Vendor Advisory
http://secunia.com/advisories/29392
http://secunia.com/advisories/29472
http://secunia.com/advisories/29503
http://secunia.com/advisories/29578
http://secunia.com/advisories/29601
http://secunia.com/advisories/29740
http://secunia.com/advisories/29766
http://secunia.com/advisories/29800
http://secunia.com/advisories/30581
http://secunia.com/advisories/31372
http://secunia.com/advisories/31393
http://secunia.com/secunia_research/2008-10/ Vendor Advisory
http://security.gentoo.org/glsa/glsa-200804-25.xml
http://security.gentoo.org/glsa/glsa-200808-01.xml
http://sourceforge.net/project/shownotes.php?release_id=585488&group_id=9655 Patch
http://wiki.videolan.org/Changelog/0.8.6f
http://www.debian.org/security/2008/dsa-1536
http://www.debian.org/security/2008/dsa-1543
http://www.mandriva.com/security/advisories?name=MDVSA-2008:178
http://www.mandriva.com/security/advisories?name=MDVSA-2008:219
http://www.securityfocus.com/bid/28312
http://www.securitytracker.com/id?1019682
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.392408
http://www.ubuntu.com/usn/usn-635-1
http://www.videolan.org/security/sa0803.php
http://www.vupen.com/english/advisories/2008/0923
http://www.vupen.com/english/advisories/2008/0985
http://xinehq.de/index.php/news Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/41339
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00456.html
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:41

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html - () http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html -
References () http://secunia.com/advisories/28694 - Vendor Advisory () http://secunia.com/advisories/28694 - Vendor Advisory
References () http://secunia.com/advisories/29392 - () http://secunia.com/advisories/29392 -
References () http://secunia.com/advisories/29472 - () http://secunia.com/advisories/29472 -
References () http://secunia.com/advisories/29503 - () http://secunia.com/advisories/29503 -
References () http://secunia.com/advisories/29578 - () http://secunia.com/advisories/29578 -
References () http://secunia.com/advisories/29601 - () http://secunia.com/advisories/29601 -
References () http://secunia.com/advisories/29740 - () http://secunia.com/advisories/29740 -
References () http://secunia.com/advisories/29766 - () http://secunia.com/advisories/29766 -
References () http://secunia.com/advisories/29800 - () http://secunia.com/advisories/29800 -
References () http://secunia.com/advisories/30581 - () http://secunia.com/advisories/30581 -
References () http://secunia.com/advisories/31372 - () http://secunia.com/advisories/31372 -
References () http://secunia.com/advisories/31393 - () http://secunia.com/advisories/31393 -
References () http://secunia.com/secunia_research/2008-10/ - Vendor Advisory () http://secunia.com/secunia_research/2008-10/ - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200804-25.xml - () http://security.gentoo.org/glsa/glsa-200804-25.xml -
References () http://security.gentoo.org/glsa/glsa-200808-01.xml - () http://security.gentoo.org/glsa/glsa-200808-01.xml -
References () http://sourceforge.net/project/shownotes.php?release_id=585488&group_id=9655 - Patch () http://sourceforge.net/project/shownotes.php?release_id=585488&group_id=9655 - Patch
References () http://wiki.videolan.org/Changelog/0.8.6f - () http://wiki.videolan.org/Changelog/0.8.6f -
References () http://www.debian.org/security/2008/dsa-1536 - () http://www.debian.org/security/2008/dsa-1536 -
References () http://www.debian.org/security/2008/dsa-1543 - () http://www.debian.org/security/2008/dsa-1543 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:178 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:178 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:219 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:219 -
References () http://www.securityfocus.com/bid/28312 - () http://www.securityfocus.com/bid/28312 -
References () http://www.securitytracker.com/id?1019682 - () http://www.securitytracker.com/id?1019682 -
References () http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.392408 - () http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.392408 -
References () http://www.ubuntu.com/usn/usn-635-1 - () http://www.ubuntu.com/usn/usn-635-1 -
References () http://www.videolan.org/security/sa0803.php - () http://www.videolan.org/security/sa0803.php -
References () http://www.vupen.com/english/advisories/2008/0923 - () http://www.vupen.com/english/advisories/2008/0923 -
References () http://www.vupen.com/english/advisories/2008/0985 - () http://www.vupen.com/english/advisories/2008/0985 -
References () http://xinehq.de/index.php/news - Patch () http://xinehq.de/index.php/news - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41339 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41339 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html - () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00456.html - () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00456.html -

Information

Published : 2008-03-24 22:44

Updated : 2024-11-21 00:41


NVD link : CVE-2008-0073

Mitre link : CVE-2008-0073

CVE.ORG link : CVE-2008-0073


JSON object : View

Products Affected

redhat

  • fedora

xine

  • xine-lib
CWE
CWE-189

Numeric Errors