cvelist/2008/0xxx/CVE-2008-0486.json

223 lines
7.2 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2008-0486",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Array index vulnerability in libmpdemux/demux_audio.c in MPlayer 1.0rc2 and SVN before r25917, and possibly earlier versions, as used in Xine-lib 1.1.10, might allow remote attackers to execute arbitrary code via a crafted FLAC tag, which triggers a buffer overflow."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20080204 CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability",
"refsource" : "BUGTRAQ",
2018-10-15 17:03:25 -04:00
"url" : "http://www.securityfocus.com/archive/1/487501/100/0/threaded"
2017-10-16 12:31:07 -04:00
},
{
"name" : "20080204 CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability",
"refsource" : "FULLDISC",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060033.html"
},
{
"name" : "http://www.coresecurity.com/?action=item&id=2103",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://www.coresecurity.com/?action=item&id=2103"
},
{
"name" : "http://www.mplayerhq.hu/design7/news.html",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://www.mplayerhq.hu/design7/news.html"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=574735",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=574735"
},
{
"name" : "http://bugs.xine-project.org/show_bug.cgi?id=38",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://bugs.xine-project.org/show_bug.cgi?id=38"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=431541",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=431541"
},
{
"name" : "http://bugs.gentoo.org/show_bug.cgi?id=209106",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://bugs.gentoo.org/show_bug.cgi?id=209106"
},
{
"name" : "DSA-1496",
"refsource" : "DEBIAN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2008/dsa-1496"
},
{
"name" : "DSA-1536",
"refsource" : "DEBIAN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2008/dsa-1536"
},
{
"name" : "FEDORA-2008-1543",
"refsource" : "FEDORA",
2017-10-16 12:31:07 -04:00
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00395.html"
},
{
"name" : "FEDORA-2008-1581",
"refsource" : "FEDORA",
2017-10-16 12:31:07 -04:00
"url" : "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00442.html"
},
{
"name" : "GLSA-200802-12",
"refsource" : "GENTOO",
2017-10-16 12:31:07 -04:00
"url" : "http://security.gentoo.org/glsa/glsa-200802-12.xml"
},
{
"name" : "GLSA-200803-16",
"refsource" : "GENTOO",
2017-10-16 12:31:07 -04:00
"url" : "http://security.gentoo.org/glsa/glsa-200803-16.xml"
},
{
"name" : "MDVSA-2008:045",
"refsource" : "MANDRIVA",
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:045"
},
{
"name" : "MDVSA-2008:046",
"refsource" : "MANDRIVA",
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2008:046"
},
{
"name" : "SUSE-SR:2008:006",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html"
},
{
"name" : "USN-635-1",
"refsource" : "UBUNTU",
2017-10-16 12:31:07 -04:00
"url" : "http://www.ubuntu.com/usn/usn-635-1"
},
{
"name" : "27441",
"refsource" : "BID",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/27441"
},
{
"name" : "ADV-2008-0406",
"refsource" : "VUPEN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2008/0406/references"
},
{
"name" : "ADV-2008-0421",
"refsource" : "VUPEN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2008/0421"
},
{
"name" : "28779",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/28779"
},
{
"name" : "28801",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/28801"
},
{
"name" : "28918",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/28918"
},
{
"name" : "28956",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/28956"
},
{
"name" : "28955",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/28955"
},
{
"name" : "28989",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/28989"
},
{
"name" : "29141",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/29141"
},
{
"name" : "29307",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/29307"
},
{
"name" : "29323",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/29323"
},
{
"name" : "29601",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/29601"
},
{
"name" : "31393",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/31393"
},
{
"name" : "3608",
"refsource" : "SREASON",
2017-10-16 12:31:07 -04:00
"url" : "http://securityreason.com/securityalert/3608"
}
]
}
}