CVE-2005-2967

Format string vulnerability in input_cdda.c in xine-lib 1-beta through 1-beta 3, 1-rc, 1.0 through 1.0.2, and 1.1.1 allows remote servers to execute arbitrary code via format string specifiers in metadata in CDDB server responses when the victim plays a CD.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0196.html
http://secunia.com/advisories/17097
http://secunia.com/advisories/17099/ Patch Vendor Advisory
http://secunia.com/advisories/17111
http://secunia.com/advisories/17132
http://secunia.com/advisories/17162
http://secunia.com/advisories/17179
http://secunia.com/advisories/17282
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.415454
http://www.debian.org/security/2005/dsa-863 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200510-08.xml Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:180
http://www.novell.com/linux/security/advisories/2005_24_sr.html
http://www.osvdb.org/19892
http://www.securityfocus.com/bid/15044 Exploit Patch
http://www.ubuntu.com/usn/usn-196-1
http://xinehq.de/index.php/security/XSA-2005-1 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/22545
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0196.html
http://secunia.com/advisories/17097
http://secunia.com/advisories/17099/ Patch Vendor Advisory
http://secunia.com/advisories/17111
http://secunia.com/advisories/17132
http://secunia.com/advisories/17162
http://secunia.com/advisories/17179
http://secunia.com/advisories/17282
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.415454
http://www.debian.org/security/2005/dsa-863 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200510-08.xml Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:180
http://www.novell.com/linux/security/advisories/2005_24_sr.html
http://www.osvdb.org/19892
http://www.securityfocus.com/bid/15044 Exploit Patch
http://www.ubuntu.com/usn/usn-196-1
http://xinehq.de/index.php/security/XSA-2005-1 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/22545
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0196.html - () http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0196.html -
References () http://secunia.com/advisories/17097 - () http://secunia.com/advisories/17097 -
References () http://secunia.com/advisories/17099/ - Patch, Vendor Advisory () http://secunia.com/advisories/17099/ - Patch, Vendor Advisory
References () http://secunia.com/advisories/17111 - () http://secunia.com/advisories/17111 -
References () http://secunia.com/advisories/17132 - () http://secunia.com/advisories/17132 -
References () http://secunia.com/advisories/17162 - () http://secunia.com/advisories/17162 -
References () http://secunia.com/advisories/17179 - () http://secunia.com/advisories/17179 -
References () http://secunia.com/advisories/17282 - () http://secunia.com/advisories/17282 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.415454 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.415454 -
References () http://www.debian.org/security/2005/dsa-863 - Patch, Vendor Advisory () http://www.debian.org/security/2005/dsa-863 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200510-08.xml - Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200510-08.xml - Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:180 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:180 -
References () http://www.novell.com/linux/security/advisories/2005_24_sr.html - () http://www.novell.com/linux/security/advisories/2005_24_sr.html -
References () http://www.osvdb.org/19892 - () http://www.osvdb.org/19892 -
References () http://www.securityfocus.com/bid/15044 - Exploit, Patch () http://www.securityfocus.com/bid/15044 - Exploit, Patch
References () http://www.ubuntu.com/usn/usn-196-1 - () http://www.ubuntu.com/usn/usn-196-1 -
References () http://xinehq.de/index.php/security/XSA-2005-1 - Patch, Vendor Advisory () http://xinehq.de/index.php/security/XSA-2005-1 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22545 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22545 -

Information

Published : 2005-10-14 10:02

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2967

Mitre link : CVE-2005-2967

CVE.ORG link : CVE-2005-2967


JSON object : View

Products Affected

xine

  • xine-lib