Vulnerability Details CVE-2008-5240
xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.03
EPSS Ranking 85.9%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2008-5240
-
cpe:2.3:a:xine:xine-lib:*
-
cpe:2.3:a:xine:xine-lib:0.9.13
-
cpe:2.3:a:xine:xine-lib:1
-
cpe:2.3:a:xine:xine-lib:1.0
-
cpe:2.3:a:xine:xine-lib:1.0.1
-
cpe:2.3:a:xine:xine-lib:1.0.2
-
cpe:2.3:a:xine:xine-lib:1.0.3a
-
cpe:2.3:a:xine:xine-lib:1.1.0
-
cpe:2.3:a:xine:xine-lib:1.1.1
-
cpe:2.3:a:xine:xine-lib:1.1.10
-
cpe:2.3:a:xine:xine-lib:1.1.10.1
-
cpe:2.3:a:xine:xine-lib:1.1.11
-
cpe:2.3:a:xine:xine-lib:1.1.11.1
-
cpe:2.3:a:xine:xine-lib:1.1.12
-
cpe:2.3:a:xine:xine-lib:1.1.13
-
cpe:2.3:a:xine:xine-lib:1.1.14
-
cpe:2.3:a:xine:xine-lib:1.1.2
-
cpe:2.3:a:xine:xine-lib:1.1.3
-
cpe:2.3:a:xine:xine-lib:1.1.4
-
cpe:2.3:a:xine:xine-lib:1.1.5
-
cpe:2.3:a:xine:xine-lib:1.1.6
-
cpe:2.3:a:xine:xine-lib:1.1.7
-
cpe:2.3:a:xine:xine-lib:1.1.8
-
cpe:2.3:a:xine:xine-lib:1.1.9
-
cpe:2.3:a:xine:xine-lib:1.1.9.1
-
cpe:2.3:a:xine:xine-lib:1_beta1
-
cpe:2.3:a:xine:xine-lib:1_beta10
-
cpe:2.3:a:xine:xine-lib:1_beta11
-
cpe:2.3:a:xine:xine-lib:1_beta12
-
cpe:2.3:a:xine:xine-lib:1_beta2
-
cpe:2.3:a:xine:xine-lib:1_beta3
-
cpe:2.3:a:xine:xine-lib:1_beta4
-
cpe:2.3:a:xine:xine-lib:1_beta5
-
cpe:2.3:a:xine:xine-lib:1_beta6
-
cpe:2.3:a:xine:xine-lib:1_beta7
-
cpe:2.3:a:xine:xine-lib:1_beta8
-
cpe:2.3:a:xine:xine-lib:1_beta9