Vulnerability Name:

CVE-2008-0225 (CCN-39550)

Assigned:2008-01-08
Published:2008-01-08
Updated:2011-10-17
Summary:Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute in an RTSP session, related to the rmff_dump_header function and related to disregarding the max field.
Note: some of these details are obtained from third party information.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Luigi Auriemma Advisories, 08 Jan 2008
rmff_dump_header heap-overflow in Xine 1.1.9

Source: MISC
Type: Exploit
http://aluigi.altervista.org/adv/xinermffhof-adv.txt

Source: CONFIRM
Type: UNKNOWN
http://bugs.gentoo.org/show_bug.cgi?id=205197

Source: MITRE
Type: CNA
CVE-2008-0225

Source: MITRE
Type: CNA
CVE-2008-0238

Source: CCN
Type: SA28384
xine-lib SDP Attributes Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
28384

Source: SECUNIA
Type: Vendor Advisory
28489

Source: SECUNIA
Type: Vendor Advisory
28507

Source: SECUNIA
Type: Vendor Advisory
28636

Source: SECUNIA
Type: Vendor Advisory
28674

Source: SECUNIA
Type: Vendor Advisory
28955

Source: SECUNIA
Type: Vendor Advisory
31393

Source: GENTOO
Type: UNKNOWN
GLSA-200801-12

Source: CONFIRM
Type: UNKNOWN
http://sourceforge.net/project/shownotes.php?release_id=567872

Source: CCN
Type: SourceForge.net
xine Files Release Notes

Source: DEBIAN
Type: UNKNOWN
DSA-1472

Source: DEBIAN
Type: DSA-1472
xine-lib -- buffer overflow

Source: CCN
Type: GLSA-200801-12
xine-lib: User-assisted execution of arbitrary code

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:020

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:045

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:002

Source: CCN
Type: OSVDB ID: 42195
xine-lib input/libreal/rmff.c rmff_dump_cont Function RTSP Session SDP Abstract Attribute Overflow

Source: CCN
Type: OSVDB ID: 42196
xine-lib input/libreal/rmff.c rmff_dump_cont Function Multiple SDP Attribute Handling Overflows

Source: BID
Type: UNKNOWN
27198

Source: CCN
Type: BID-27198
xine-lib 'rmff_dump_cont()' Remote Heap Buffer Overflow Vulnerability

Source: CCN
Type: USN-635-1
xine-lib vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-635-1

Source: VUPEN
Type: Vendor Advisory
ADV-2008-0163

Source: CCN
Type: xine Web site
xine - A Free Video Player

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=428620

Source: XF
Type: UNKNOWN
xine-rmffdumpheader-bo(39550)

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-0718

Source: SUSE
Type: SUSE-SR:2008:002
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xine:xine-lib:*:*:*:*:*:*:*:* (Version <= 1.1.9)

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:26132
    P
    Security update for MozillaFirefox (Important)
    2021-09-22
    oval:org.opensuse.security:def:20080225
    V
    CVE-2008-0225
    2021-08-15
    oval:org.opensuse.security:def:36507
    P
    libxine-devel-1.1.15-23.3.9 on GA media (Moderate)
    2021-06-08
    oval:org.opensuse.security:def:26068
    P
    Security update for libX11 (Important)
    2021-06-08
    oval:org.opensuse.security:def:26056
    P
    Security update for curl (Moderate)
    2021-05-26
    oval:org.opensuse.security:def:26057
    P
    Security update for libX11 (Moderate)
    2021-05-26
    oval:org.opensuse.security:def:26735
    P
    libMagickCore1-32bit on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27470
    P
    libpcp3 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26482
    P
    Security update for ffmpeg-4 (Low)
    2020-12-01
    oval:org.opensuse.security:def:26774
    P
    libxml2 on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26260
    P
    Security update for Mesa (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:27505
    P
    libxine-devel on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26633
    P
    python on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26788
    P
    nagios-plugins on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26341
    P
    Security update for fmpeg (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26686
    P
    dhcpcd on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26832
    P
    tftp on GA media (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26398
    P
    Security update for pdns-recursor (Moderate)
    2020-12-01
    oval:org.mitre.oval:def:17590
    P
    USN-635-1 -- xine-lib vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:7756
    P
    DSA-1472 xine-lib -- buffer overflow
    2014-06-23
    oval:org.debian:def:1472
    V
    buffer overflow
    2008-01-21
    BACK
    xine xine-lib *