Vulnerability Details : CVE-2006-1664
Buffer overflow in xine_list_delete_current in libxine 1.14 and earlier, as distributed in xine-lib 1.1.1 and earlier, allows remote attackers to execute arbitrary code via a crafted MPEG stream.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-1664
- cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1664
7.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1664
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-1664
-
http://www.securityfocus.com/data/vulnerabilities/exploits/xinelib_poc.pl
Exploit
-
https://www.exploit-db.com/exploits/1641
-
http://www.securityfocus.com/bid/17370
-
http://securitytracker.com/id?1015868
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00956.html
-
http://www.gentoo.org/security/en/glsa/glsa-200604-16.xml
-
http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=571608
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25670
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00976.html
-
http://bugs.gentoo.org/show_bug.cgi?id=128838
Jump to