Vulnerability Details : CVE-2008-0629
Buffer overflow in stream_cddb.c in MPlayer 1.0rc2 and SVN before r25824 allows remote user-assisted attackers to execute arbitrary code via a CDDB database entry containing a long album title.
Vulnerability category: OverflowExecute code
Products affected by CVE-2008-0629
- cpe:2.3:a:mplayer:mplayer:1.02rc2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-0629
6.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-0629
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2008-0629
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-0629
-
http://www.debian.org/security/2008/dsa-1496
[SECURITY] [DSA 1496-1] New mplayer packages fix arbitrary code execution
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:045
Mandriva
-
http://www.securityfocus.com/bid/27765
-
http://security.gentoo.org/glsa/glsa-200803-16.xml
MPlayer: Multiple buffer overflows (GLSA 200803-16) — Gentoo security
-
http://www.mplayerhq.hu/design7/news.html
MPlayer - The Movie Player
Jump to