CVE-2008-1686 : Detail

CVE-2008-1686

5.25%V4
Network
2008-04-08
18h00 +00:00
2024-08-07
08h32 +00:00
Meldingen voor een CVE
Blijf op de hoogte van wijzigingen voor een specifieke CVE.
Meldingen beheren

CVE-beschrijvingen

Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.

CVE-informatie

Gerelateerde zwakheden

CWE-ID Zwakheidsnaam Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metriek

Metriek Score Ernst CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is een scoremodel dat de kans voorspelt dat een kwetsbaarheid wordt uitgebuit.

EPSS-score

Het EPSS-model produceert een kans score tussen 0 en 1 (0 en 100%). Hoe hoger de score, hoe groter de kans dat een kwetsbaarheid wordt uitgebuit.

EPSS-percentiel

Het percentiel wordt gebruikt om CVE's te rangschikken op basis van hun EPSS-score. Een CVE in het 95e percentiel heeft bijvoorbeeld een grotere kans om te worden uitgebuit dan 95% van de andere CVE's. Het percentiel wordt dus gebruikt om de EPSS-score van een CVE te vergelijken met die van andere CVE's.

Products Mentioned

Configuraton 0

Xine>>Xine-lib >> Version To (including) 1.1.11.1

Xine>>Xine-lib >> Version 0.9.8

Xine>>Xine-lib >> Version 0.9.13

Xine>>Xine-lib >> Version 0.99

Xine>>Xine-lib >> Version 1.0

Xine>>Xine-lib >> Version 1.0.1

Xine>>Xine-lib >> Version 1.0.2

Xine>>Xine-lib >> Version 1.0.3a

Xine>>Xine-lib >> Version 1.1.0

Xine>>Xine-lib >> Version 1.1.1

Xine>>Xine-lib >> Version 1.1.10

Xine>>Xine-lib >> Version 1.1.10.1

Xine>>Xine-lib >> Version 1.1.11

Configuraton 0

Xiph>>Speex >> Version To (including) 1.1.12

Xiph>>Speex >> Version 1.0.2

Xiph>>Speex >> Version 1.0.3

Xiph>>Speex >> Version 1.0.4

Xiph>>Speex >> Version 1.0.5

Xiph>>Speex >> Version 1.1.1

Xiph>>Speex >> Version 1.1.2

Xiph>>Speex >> Version 1.1.3

Xiph>>Speex >> Version 1.1.4

Xiph>>Speex >> Version 1.1.5

Xiph>>Speex >> Version 1.1.6

Xiph>>Speex >> Version 1.1.7

Xiph>>Speex >> Version 1.1.8

Xiph>>Speex >> Version 1.1.9

Xiph>>Speex >> Version 1.1.10

Xiph>>Speex >> Version 1.1.11

Xiph>>Speex >> Version 1.1.11.1

Xiph>>Libfishsound >> Version To (including) 0.9.0

Xiph>>Libfishsound >> Version 0.5.41

Xiph>>Libfishsound >> Version 0.5.42

Xiph>>Libfishsound >> Version 0.6.0

Xiph>>Libfishsound >> Version 0.6.1

Xiph>>Libfishsound >> Version 0.6.2

Xiph>>Libfishsound >> Version 0.6.3

Xiph>>Libfishsound >> Version 0.7.0

Xiph>>Libfishsound >> Version 0.8.0

Xiph>>Libfishsound >> Version 0.8.1

Referenties

http://www.ubuntu.com/usn/usn-611-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDVSA-2008:124
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.securitytracker.com/id?1019875
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/29878
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29898
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29866
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1586
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/30117
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30104
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29727
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-611-3
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/29672
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1585
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDVSA-2008:092
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/30353
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29835
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29880
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31393
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1584
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/29845
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-611-2
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.redhat.com/support/errata/RHSA-2008-0235.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/30358
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29854
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:094
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/29881
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:093
Tags : vendor-advisory, x_refsource_MANDRIVA
http://security.gentoo.org/glsa/glsa-200804-17.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/30119
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/28665
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/29882
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-635-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/30337
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30581
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30717
Tags : third-party-advisory, x_refsource_SECUNIA