Vulnerability Name: | CVE-2004-1455 (CCN-16930) | ||||||||
Assigned: | 2004-08-08 | ||||||||
Published: | 2004-08-08 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Stack-based buffer overflow in Xine-lib-rc5 in xine-lib 1_rc5-r2 and earlier allows remote attackers to execute arbitrary code via crafted playlists that result in a long vcd:// URL. | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2004-1455 Source: BUGTRAQ Type: UNKNOWN 20040817 Open Security Group Advisory #6 Source: MISC Type: UNKNOWN http://open-security.org/advisories/6 Source: CCN Type: SA12194 Xine "vcd:" Input Source Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 12194 Source: CCN Type: xine Web page Project: xine - a free video player: Mailing Lists Source: GENTOO Type: Patch GLSA-200408-18 Source: CCN Type: open security advisory #6 Xine vcd MRL input identifier management overflow Source: CCN Type: OSVDB ID: 8409 Xine vcd: Input Source Remote Overflow Source: BID Type: Exploit, Patch 10890 Source: CCN Type: BID-10890 Xine-Lib Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN xine-vcd-identifier-bo(16930) Source: XF Type: UNKNOWN xine-vcd-identifier-bo(16930) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |