CVE-2005-1692

Format string vulnerability in gxine 0.4.1 through 0.4.4, and other versions down to 0.3, allows remote attackers to execute arbitrary code via a ram file with a URL whose hostname contains format string specifiers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xine:gxine:0.41:*:*:*:*:*:*:*
cpe:2.3:a:xine:gxine:0.42:*:*:*:*:*:*:*
cpe:2.3:a:xine:gxine:0.43:*:*:*:*:*:*:*
cpe:2.3:a:xine:gxine:0.44:*:*:*:*:*:*:*

History

20 Nov 2024, 23:57

Type Values Removed Values Added
References () http://cvs.sourceforge.net/viewcvs.py/xine/gnome-xine/ChangeLog?rev=HEAD&content-type=text/vnd.viewcvs-markup - () http://cvs.sourceforge.net/viewcvs.py/xine/gnome-xine/ChangeLog?rev=HEAD&content-type=text/vnd.viewcvs-markup -
References () http://marc.info/?l=bugtraq&m=111670637812128&w=2 - () http://marc.info/?l=bugtraq&m=111670637812128&w=2 -
References () http://secunia.com/advisories/15451 - () http://secunia.com/advisories/15451 -
References () http://security.gentoo.org/glsa/glsa-200505-19.xml - () http://security.gentoo.org/glsa/glsa-200505-19.xml -
References () http://www.0xbadexworm.org/adv/gxinefmt.txt - URL Repurposed () http://www.0xbadexworm.org/adv/gxinefmt.txt - URL Repurposed
References () http://www.osvdb.org/16747 - () http://www.osvdb.org/16747 -
References () http://www.securityfocus.com/bid/13707 - () http://www.securityfocus.com/bid/13707 -
References () http://www.vupen.com/english/advisories/2005/0626 - () http://www.vupen.com/english/advisories/2005/0626 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://www.0xbadexworm.org/adv/gxinefmt.txt - (MISC) http://www.0xbadexworm.org/adv/gxinefmt.txt - URL Repurposed

Information

Published : 2005-05-24 04:00

Updated : 2024-11-20 23:57


NVD link : CVE-2005-1692

Mitre link : CVE-2005-1692

CVE.ORG link : CVE-2005-1692


JSON object : View

Products Affected

xine

  • gxine