René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

132 lines
4.7 KiB
JSON

{
"id": "CVE-2009-0893",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-06-02T18:30:00.233",
"lastModified": "2018-08-13T21:47:32.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Multiple heap-based buffer overflows in xvidcore/src/decoder.c in the xvidcore library in Xvid before 1.2.2, as used by Windows Media Player and other applications, allow remote attackers to execute arbitrary code by providing a crafted macroblock (aka MBlock) number in a video stream in a crafted movie file that triggers heap memory corruption, related to a \"missing resync marker range check\" and the (1) decoder_iframe, (2) decoder_pframe, and (3) decoder_bframe functions."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de memoria basados en memoria din\u00e1mica en xvidcore/src/decoder.c en la librer\u00eda xvidcore en Xvid anteriores a v1.2.2, tal y como es utilizado en Windows Media Player y otras aplicaciones, permite a atacantes remotos ejecutar c\u00f3digo de forma arbitraria mediante un numero \"macroblock\" (tambi\u00e9n conocido como MBlock) en una difusi\u00f3n de v\u00eddeo en un fichero de pel\u00edcula manipulado que inicia la corrupci\u00f3n de la memoria din\u00e1mica, relacionado con una \"comprobaci\u00f3n de perdida de sincronizaci\u00f3n de marcador\" y las funciones (1) decoder_iframe, (2) decoder_pframe, y (3) decoder_bframe."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xvid:xvid:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2.1",
"matchCriteriaId": "64677D58-FD33-49D1-9CF4-FDDAA276BBA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xvid:xvid:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E1AB2BD9-FBE3-44E9-85AD-CFDD89036096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xvid:xvid:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC174AC0-DAC0-4416-8886-57A360426A86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xvid:xvid:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7EBF71AE-3B19-45F8-9ED7-ED59885E33B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xvid:xvid:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CAF0BE91-717E-45B4-B10D-3B31D8D91305"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xvid:xvid:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "012DC76F-FD6D-4AC8-B0DD-E9613A5B1B3A"
}
]
}
]
}
],
"references": [
{
"url": "http://cvs.xvid.org/cvs/viewvc.cgi/xvidcore/src/decoder.c",
"source": "cve@mitre.org"
},
{
"url": "http://cvs.xvid.org/cvs/viewvc.cgi/xvidcore/src/decoder.c?r1=1.80&r2=1.81",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/35156",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2009/1468",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.xvid.org/News.64.0.html?&cHash=0170b4e439&tx_ttnews[backPid]=64&tx_ttnews[tt_news]=7",
"source": "cve@mitre.org"
},
{
"url": "https://www.it-isac.org/postings/cyber/alertdetail.php?id=4634&selyear=2009&menutype=menupublic",
"source": "cve@mitre.org"
}
]
}