Name | CVE-2008-5243 |
Description | The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 508716 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
xine-lib | source | lenny | 1.1.14-4 | |||
xine-lib | source | squeeze | 1.1.14-4 | |||
xine-lib | source | (unstable) | 1.1.16-1 | 508716 |
these are just invalid reads that result in segfaults, denial of service doesnt
apply here as xine reading a file is no service -> application bug