Vulnerability Description
Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Fedora | 8 |
| Xine | Xine-Lib | 1.1.10.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
- http://secunia.com/advisories/28694Vendor Advisory
- http://secunia.com/advisories/29392
- http://secunia.com/advisories/29472
- http://secunia.com/advisories/29503
- http://secunia.com/advisories/29578
- http://secunia.com/advisories/29601
- http://secunia.com/advisories/29740
- http://secunia.com/advisories/29766
- http://secunia.com/advisories/29800
- http://secunia.com/advisories/30581
- http://secunia.com/advisories/31372
- http://secunia.com/advisories/31393
- http://secunia.com/secunia_research/2008-10/Vendor Advisory
FAQ
What is CVE-2008-0073?
CVE-2008-0073 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.
How severe is CVE-2008-0073?
CVE-2008-0073 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0073?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Fedora, Xine Xine-Lib.