Vulnerability Name:

CVE-2004-1455 (CCN-16930)

Assigned:2004-08-08
Published:2004-08-08
Updated:2017-07-11
Summary:Stack-based buffer overflow in Xine-lib-rc5 in xine-lib 1_rc5-r2 and earlier allows remote attackers to execute arbitrary code via crafted playlists that result in a long vcd:// URL.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-1455

Source: BUGTRAQ
Type: UNKNOWN
20040817 Open Security Group Advisory #6

Source: MISC
Type: UNKNOWN
http://open-security.org/advisories/6

Source: CCN
Type: SA12194
Xine "vcd:" Input Source Buffer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
12194

Source: CCN
Type: xine Web page
Project: xine - a free video player: Mailing Lists

Source: GENTOO
Type: Patch
GLSA-200408-18

Source: CCN
Type: open security advisory #6
Xine vcd MRL input identifier management overflow

Source: CCN
Type: OSVDB ID: 8409
Xine vcd: Input Source Remote Overflow

Source: BID
Type: Exploit, Patch
10890

Source: CCN
Type: BID-10890
Xine-Lib Remote Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
xine-vcd-identifier-bo(16930)

Source: XF
Type: UNKNOWN
xine-vcd-identifier-bo(16930)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_rc5_r2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    xine xine-lib 1_beta1
    xine xine-lib 1_beta2
    xine xine-lib 1_beta3
    xine xine-lib 1_beta4
    xine xine-lib 1_beta5
    xine xine-lib 1_beta6
    xine xine-lib 1_beta7
    xine xine-lib 1_beta8
    xine xine-lib 1_beta9
    xine xine-lib 1_beta10
    xine xine-lib 1_beta11
    xine xine-lib 1_rc2
    xine xine-lib 1_rc3a
    xine xine-lib 1_rc3b
    xine xine-lib 1_rc3c
    xine xine-lib 1_rc4
    xine xine-lib 1_rc5
    xine xine-lib 1_rc5_r2