Vulnerability Details : CVE-2004-1379
Heap-based buffer overflow in the DVD subpicture decoder in xine xine-lib 1-rc5 and earlier allows remote attackers to execute arbitrary code via a (1) DVD or (2) MPEG subpicture header where the second field reuses RLE data from the end of the first field.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2004-1379
Probability of exploitation activity in the next 30 days: 10.61%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-1379
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
[email protected] |
References for CVE-2004-1379
-
http://www.debian.org/security/2005/dsa-657
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/11205
Patch
-
http://www.vuxml.org/freebsd/131bd7c4-64a3-11d9-829a-000a95bc6fae.html
-
http://www.securityfocus.com/archive/1/375482/2004-09-02/2004-09-08/0
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17423
- http://www.gentoo.org/security/en/glsa/glsa-200409-30.xml
-
http://xinehq.de/index.php/security/XSA-2004-5
Patch;Vendor Advisory
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.320308
Patch
Products affected by CVE-2004-1379
- cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*