Vulnerability Name: | CVE-2004-0433 (CCN-16019) | ||||||||
Assigned: | 2004-04-30 | ||||||||
Published: | 2004-04-30 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Multiple buffer overflows in the Real-Time Streaming Protocol (RTSP) client for (1) MPlayer before 1.0pre4 and (2) xine lib (xine-lib) before 1-rc4, when playing Real RTSP (realrtsp) streams, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (a) long URLs, (b) long Real server responses, or (c) long Real Data Transport (RDT) packets. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2004-0433 Source: GENTOO Type: Vendor Advisory GLSA-200405-24 Source: CCN Type: GLSA-200405-24 MPlayer, xine-lib: vulnerabilities in RTSP stream handling Source: CCN Type: MPlayer Web site Mplayer:HU _ The Movie Player for Linux Source: CCN Type: OSVDB ID: 5723 MPlayer/xine-lib HTTP Parser Overflow Source: CCN Type: OSVDB ID: 5724 MPlayer/xine-lib RTSP Session Negotiation Overflow Source: CCN Type: OSVDB ID: 5725 MPlayer/xine-lib RealNetwork RDT Response Overflow Source: CCN Type: BID-10245 MPlayer/Xine-Lib Multiple RealRTSP Buffer Overrun Vulnerabilities Source: CCN Type: slackware-security Mailing List, Mon, 3 May 2004 13:07:44 -0700 (PDT) xine-lib update (SSA:2004-124-03) Source: CONFIRM Type: UNKNOWN http://www.xinehq.de/index.php/security/XSA-2004-3 Source: CCN Type: xine Web site xine - A Free Video Player Source: CCN Type: The xine-Project Security Advisory XSA-2004-3 Multiple vulnerabilities have being found and fixed in the Real-Time Streaming Source: XF Type: UNKNOWN mplayer-rtsp-rdt-bo(16019) Source: XF Type: UNKNOWN mplayer-rtsp-rdt-bo(16019) | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |