Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2008-0073
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.8/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:* |
Yes
|
- |
References
- http://secunia.com/secunia_research/2008-10/
- http://sourceforge.net/project/shownotes.php?release_id=585488&group_id=9655
- http://xinehq.de/index.php/news
- http://www.securityfocus.com/bid/28312
- http://secunia.com/advisories/28694
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00456.html
- http://www.securitytracker.com/id?1019682
- http://secunia.com/advisories/29472
- http://www.debian.org/security/2008/dsa-1536
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-sec
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
- http://secunia.com/advisories/29392
- http://secunia.com/advisories/29578
- http://secunia.com/advisories/29601
- http://www.debian.org/security/2008/dsa-1543
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html
- http://secunia.com/advisories/29766
- http://secunia.com/advisories/29740
- http://security.gentoo.org/glsa/glsa-200804-25.xml
- http://wiki.videolan.org/Changelog/0.8.6f
- http://www.videolan.org/security/sa0803.php
- http://secunia.com/advisories/29800
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
- http://secunia.com/advisories/31393
- http://secunia.com/advisories/31372
- http://secunia.com/advisories/30581
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:178
- http://security.gentoo.org/glsa/glsa-200808-01.xml
- http://www.ubuntu.com/usn/usn-635-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:219
- http://www.vupen.com/english/advisories/2008/0985
- http://secunia.com/advisories/29503
- http://www.vupen.com/english/advisories/2008/0923
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41339