CVE-2008-5239
26.11.2008, 01:30
xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not properly handle (a) negative and (b) zero values during unspecified read function calls in input_file.c, input_net.c, input_smb.c, and input_http.c, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via vectors such as (1) a file or (2) an HTTP response, which triggers consequences such as out-of-bounds reads and heap-based buffer overflows.Enginsight
Vendor | Product | Version |
---|---|---|
xine | xine-lib | 0.9.13 |
xine | xine-lib | 1.0 |
xine | xine-lib | 1.0.1 |
xine | xine-lib | 1.0.2 |
xine | xine-lib | 1.0.3a:a |
xine | xine-lib | 1.1.0 |
xine | xine-lib | 1.1.1 |
xine | xine-lib | 1.1.2 |
xine | xine-lib | 1.1.3 |
xine | xine-lib | 1.1.4 |
xine | xine-lib | 1.1.5 |
xine | xine-lib | 1.1.6 |
xine | xine-lib | 1.1.7 |
xine | xine-lib | 1.1.8 |
xine | xine-lib | 1.1.9 |
xine | xine-lib | 1.1.9.1 |
xine | xine-lib | 1.1.10 |
xine | xine-lib | 1.1.10.1 |
xine | xine-lib | 1.1.11 |
xine | xine-lib | 1.1.11.1 |
xine | xine-lib | 1.1.12 |
xine | xine-lib | 1.1.13 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References