Vulnerability Name:

CVE-2006-2200 (CCN-27320)

Assigned:2006-06-22
Published:2006-06-22
Updated:2011-08-02
Summary:Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Debian Bug report logs - #374577
mimms: patch to fix many buffer overflows vulnerability

Source: CONFIRM
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374577

Source: MITRE
Type: CNA
CVE-2006-2200

Source: CCN
Type: Mandriva Web site
MDKSA-2006:121

Source: CCN
Type: MiMMS Web site
MiMMS isn't an MMS Message Sender - Summary [Savannah]

Source: CCN
Type: SA20749
MiMMS Media Stream Handling Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
20749

Source: SECUNIA
Type: Vendor Advisory
20948

Source: SECUNIA
Type: Vendor Advisory
20964

Source: SECUNIA
Type: Vendor Advisory
21023

Source: SECUNIA
Type: Vendor Advisory
21036

Source: SECUNIA
Type: Vendor Advisory
21139

Source: CCN
Type: SA23218
xine-lib libreal and libmms Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
23218

Source: SECUNIA
Type: Vendor Advisory
23512

Source: GENTOO
Type: UNKNOWN
GLSA-200607-07

Source: CCN
Type: Slackware Web Site
SSA:2006-357-05

Source: SLACKWARE
Type: UNKNOWN
SSA:2006-357-05

Source: CONFIRM
Type: UNKNOWN
http://sourceforge.net/project/shownotes.php?release_id=468432

Source: CCN
Type: GLSA-200607-07
xine-lib: Buffer overflow

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:117

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:121

Source: CCN
Type: OSVDB ID: 26767
MiMMS Media Stream Handling Multiple Function Overflow

Source: BID
Type: UNKNOWN
18608

Source: CCN
Type: BID-18608
MiMMS Media Stream Handling Remote Buffer Overflow Vulnerability

Source: CCN
Type: USN-309-1
libmms vulnerability

Source: UBUNTU
Type: UNKNOWN
USN-309-1

Source: UBUNTU
Type: UNKNOWN
USN-315-1

Source: VUPEN
Type: Vendor Advisory
ADV-2006-2487

Source: XF
Type: UNKNOWN
mimms-getheader-getmediapacket-bo(27320)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mimms:mimms:0.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    mimms mimms 0.0.9
    xine xine-lib 1.1.0