Max CVSS | 10.0 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2008-5233 | 4.3 |
xine-lib 1.1.12, and other versions before 1.1.15, does not check for failure of malloc in circumstances including (1) the mymng_process_header function in demux_mng.c, (2) the open_mod_file function in demux_mod.c, and (3) frame_buffer allocation in
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5234 | 9.3 |
Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5247 | 4.3 |
The real_parse_audio_specific_data function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, uses an untrusted height (aka codec_data_length) value as a divisor, which allow remote attackers to cause a denial of service (div
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5242 | 6.8 |
demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not validate the count field before calling calloc for STSD_ATOM atom allocation, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitr
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5238 | 7.1 |
Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size fiel
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5241 | 4.3 |
Integer underflow in demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allows remote attackers to cause a denial of service (crash) via a crafted media file that results in a small value of moov_atom_size in a compressed MOV (aka
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5240 | 4.3 |
xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5243 | 4.3 |
The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (cr
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5236 | 9.3 |
Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in d
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5239 | 4.3 |
xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not properly handle (a) negative and (b) zero values during unspecified read function calls in input_file.c, input_net.c, input_smb.c, and input_http.c, which allows remote attackers to cau
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 | |
CVE-2008-5237 | 10.0 |
Multiple integer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) crafted width and height values that are not validated by the
|
11-10-2018 - 20:54 | 26-11-2008 - 01:30 |