CVE-2008-5236

CVSS V2 High 9.3 CVSS V3 None
Description
Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c. NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.
Overview
  • CVE ID
  • CVE-2008-5236
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2008-11-26T01:30:00
  • Last Modified Date
  • 2018-10-11T20:54:29
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:xine:xine:*:*:*:*:*:*:*:* 1 OR 1.1.5
cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta10:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta11:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta12:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta3:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta4:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta5:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta6:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta7:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta8:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:beta9:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc0a:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc3a:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc3b:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc3c:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc4:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc4a:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc5:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc6a:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc7:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1:rc8:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.0.3a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.1.10.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.1.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:xine:xine:1.1.11.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
History
Created Old Value New Value Data Type Notes
2022-05-10 18:27:32 Added to TrackCVE