Vulnerability CVE-2006-2200


Published: 2006-06-27   Modified: 2012-02-12

Description:
Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
XINE -> Xine-lib 
Mimms -> Mimms 

 References:
http://www.vupen.com/english/advisories/2006/2487
http://www.ubuntu.com/usn/usn-315-1
http://www.ubuntu.com/usn/usn-309-1
http://www.securityfocus.com/bid/18608
http://www.mandriva.com/security/advisories?name=MDKSA-2006:121
http://www.mandriva.com/security/advisories?name=MDKSA-2006:117
http://sourceforge.net/project/shownotes.php?release_id=468432
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
http://security.gentoo.org/glsa/glsa-200607-07.xml
http://secunia.com/advisories/23512
http://secunia.com/advisories/23218
http://secunia.com/advisories/21139
http://secunia.com/advisories/21036
http://secunia.com/advisories/21023
http://secunia.com/advisories/20964
http://secunia.com/advisories/20948
http://secunia.com/advisories/20749
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374577

Copyright 2024, cxsecurity.com

 

Back to Top