Vulnerability Details : CVE-2008-1878
Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2008-1878
Probability of exploitation activity in the next 30 days: 16.93%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-1878
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
[email protected] |
CWE ids for CVE-2008-1878
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2008-1878
-
http://www.vupen.com/english/advisories/2008/1247/references
-
https://www.exploit-db.com/exploits/5458
-
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00536.html
-
http://www.securityfocus.com/bid/28816
-
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00571.html
- http://www.ubuntu.com/usn/usn-635-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:178
- http://security.gentoo.org/glsa/glsa-200808-01.xml
- http://www.debian.org/security/2008/dsa-1586
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:177
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/41865
Products affected by CVE-2008-1878
- cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*