Vulnerability Name:

CVE-2006-2802 (CCN-26972)

Assigned:2006-05-30
Published:2006-05-30
Updated:2018-10-03
Summary:Buffer overflow in the HTTP Plugin (xineplug_inp_http.so) for xine-lib 1.1.1 allows remote attackers to cause a denial of service (application crash) via a long reply from an HTTP server, as demonstrated using gxine 0.5.6.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2006-2802

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:014

Source: CCN
Type: SA20369
xine-lib HTTP Response Heap Corruption Weakness

Source: SECUNIA
Type: Exploit, Vendor Advisory
20369

Source: SECUNIA
Type: UNKNOWN
20549

Source: SECUNIA
Type: UNKNOWN
20766

Source: SECUNIA
Type: UNKNOWN
20828

Source: SECUNIA
Type: UNKNOWN
20942

Source: SECUNIA
Type: UNKNOWN
21919

Source: GENTOO
Type: UNKNOWN
GLSA-200609-08

Source: DEBIAN
Type: UNKNOWN
DSA-1105

Source: DEBIAN
Type: DSA-1105
xine-lib -- buffer overflow

Source: CCN
Type: GLSA-200609-08
xine-lib: Buffer overflows

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2006:108

Source: OSVDB
Type: UNKNOWN
25936

Source: CCN
Type: OSVDB ID: 25936
xine-lib xineplug_inp_http.so HTTP Response Remote Overflow

Source: BID
Type: Exploit
18187

Source: CCN
Type: BID-18187
Xine-Lib HTTP Response Buffer Overflow Vulnerability

Source: CCN
Type: USN-295-1
xine-lib vulnerability

Source: CCN
Type: xine Web site
xine - A Free Video Player

Source: XF
Type: UNKNOWN
xinelib-xinepluginphttp-bo(26972)

Source: XF
Type: UNKNOWN
xinelib-xinepluginphttp-bo(26972)

Source: UBUNTU
Type: UNKNOWN
USN-295-1

Source: EXPLOIT-DB
Type: UNKNOWN
1852

Source: SUSE
Type: SUSE-SR:2006:014
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xine:gxine:0.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06:*:lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20062802
    V
    CVE-2006-2802
    2015-11-16
    oval:org.debian:def:1105
    V
    buffer overflow
    2006-07-07
    BACK
    xine gxine 0.5.6
    xine xine-lib 1.0.1
    xine xine-lib 1.0.2
    xine xine-lib 1.1.0
    xine xine-lib 1.1.1
    xine xine-lib 1.1.1
    debian debian linux 3.0
    gentoo linux *
    mandrakesoft mandrake linux corporate server 3.0
    debian debian linux 3.1
    mandrakesoft mandrake linux 2006
    canonical ubuntu 6.06
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0