Return to CVE list

CVE-2008-0073

6.8
Medium

CVE-2008-0073

PSIRT-CNA@flexerasoftware.com
Modified

Description

Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.

Exploits

54982008-04-25localWindows

Kantaris 0.3.4 - SSA Subtitle Local Buffer Overflow

By j0rgan

References

PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/28694
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/29392
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/29472
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/29503
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/29578
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/29601
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/29740
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/29766
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/29800
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/30581
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/31372
PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/31393
PSIRT-CNA@flexerasoftware.com
http://wiki.videolan.org/Changelog/0.8.6f
PSIRT-CNA@flexerasoftware.com
http://www.securityfocus.com/bid/28312
PSIRT-CNA@flexerasoftware.com
http://www.securitytracker.com/id?1019682
PSIRT-CNA@flexerasoftware.com
http://www.ubuntu.com/usn/usn-635-1
PSIRT-CNA@flexerasoftware.com
http://www.videolan.org/security/sa0803.php
PSIRT-CNA@flexerasoftware.com
http://xinehq.de/index.php/news
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/28694
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29392
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29472
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29503
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29578
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29601
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29740
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29766
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29800
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/30581
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31372
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/31393
af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/secunia_research/2008-10/
af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200804-25.xml
af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200808-01.xml
af854a3a-2127-422b-91ae-364da2661108
http://wiki.videolan.org/Changelog/0.8.6f
af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1536
af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1543
af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28312
af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1019682
af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-635-1
af854a3a-2127-422b-91ae-364da2661108
http://www.videolan.org/security/sa0803.php
af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0923
af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0985
af854a3a-2127-422b-91ae-364da2661108
http://xinehq.de/index.php/news