Vulnerability Name:

CVE-2008-5238 (CCN-44650)

Assigned:2008-08-22
Published:2008-08-22
Updated:2018-10-11
Summary:Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-189
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-5238

Source: SUSE
Type: UNKNOWN
SUSE-SR:2009:004

Source: CCN
Type: SA31567
xine-lib Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
31827

Source: SREASON
Type: UNKNOWN
4648

Source: CCN
Type: SECTRACK ID: 1020703
xine-lib Bugs in Processing Media Files Lets Remote Users Deny Service and Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1020703

Source: CONFIRM
Type: UNKNOWN
http://sourceforge.net/project/shownotes.php?release_id=619869

Source: CCN
Type: GLSA-201006-04
xine-lib: User-assisted execution of arbitrary code

Source: CCN
Type: oCERT Advisories #2008-008
multiple heap overflows in xine-lib

Source: MISC
Type: UNKNOWN
http://www.ocert.org/analysis/2008-008/analysis.txt

Source: CCN
Type: OSVDB ID: 47743
xine-lib src/demuxers/demux_real.c Multiple Function Overflows

Source: BUGTRAQ
Type: UNKNOWN
20080822 [oCERT-2008-008] multiple heap overflows in xine-lib

Source: BID
Type: UNKNOWN
30797

Source: CCN
Type: BID-30797
xine-lib 1.1.15 and Prior Multiple Remote Vulnerabilities

Source: CCN
Type: USN-710-1
xine-lib vulnerabilities

Source: CCN
Type: xine Web site
xine - A Free Video Player

Source: XF
Type: UNKNOWN
xinelib-realparsemdpr-code-execution(44650)

Source: XF
Type: UNKNOWN
xinelib-realparsemdpr-bo(44650)

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-7572

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-7512

Source: SUSE
Type: SUSE-SR:2009:004
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xine:xine:0.9.13:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta1:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta10:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta11:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta12:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta2:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta3:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta4:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta5:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta6:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta7:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta8:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:beta9:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc0a:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc1:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc2:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc3:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc3a:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc3b:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc3c:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc4:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc4a:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc5:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc6a:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc7:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1:rc8:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.0.3a:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.1.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:1.1.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine:*:*:*:*:*:*:*:* (Version <= 1.1.14)

  • Configuration CCN 1:
  • cpe:/a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1:rc8:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1:rc7:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1:rc5:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1:rc4:*:*:*:*:*:*
  • OR cpe:/a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20085238
    V
    CVE-2008-5238
    2017-09-27
    oval:org.mitre.oval:def:13851
    P
    USN-710-1 -- xine-lib vulnerabilities
    2014-06-30
    BACK
    xine xine 0.9.13
    xine xine 1 beta1
    xine xine 1 beta10
    xine xine 1 beta11
    xine xine 1 beta12
    xine xine 1 beta2
    xine xine 1 beta3
    xine xine 1 beta4
    xine xine 1 beta5
    xine xine 1 beta6
    xine xine 1 beta7
    xine xine 1 beta8
    xine xine 1 beta9
    xine xine 1 rc0a
    xine xine 1 rc1
    xine xine 1 rc2
    xine xine 1 rc3
    xine xine 1 rc3a
    xine xine 1 rc3b
    xine xine 1 rc3c
    xine xine 1 rc4
    xine xine 1 rc4a
    xine xine 1 rc5
    xine xine 1 rc6a
    xine xine 1 rc7
    xine xine 1 rc8
    xine xine 1.0
    xine xine 1.0.1
    xine xine 1.0.2
    xine xine 1.0.3a
    xine xine 1.1.0
    xine xine 1.1.1
    xine xine 1.1.2
    xine xine 1.1.3
    xine xine 1.1.4
    xine xine 1.1.10.1
    xine xine 1.1.11
    xine xine 1.1.11.1
    xine xine *
    xine xine-lib 1.1.1
    xine xine-lib 1.1.10
    xine xine-lib 1.1.12
    xine xine-lib 1.1.11
    xine xine-lib 1.1.13
    xine xine-lib 1.1.14
    xine xine-lib 1.0.2
    xine xine-lib 1.0.1
    xine xine-lib 1.0
    xine xine-lib 1 rc8
    xine xine-lib 1 rc7
    xine xine-lib 1 rc6a
    xine xine-lib 1_rc6
    xine xine-lib 1 rc5
    xine xine-lib 1 rc4
    xine xine-lib 1 rc3c
    gentoo linux *
    canonical ubuntu 6.06
    canonical ubuntu 7.10
    canonical ubuntu 8.04