CVE-2009-1274
Published Apr 8, 2009
Last updated 6 years ago
Overview
- Description
- Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAB10333-6C25-4359-BB3F-D76468170825" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2377493B-8CC0-414B-AA5F-B7777C852195" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFC149FA-B916-4844-AD98-B7827116C803" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2BBF4E9-6090-4ED3-8A12-09396E660505" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA642532-365F-4981-BA09-A56D3628271C" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C34F27CC-0D88-42C0-93B4-87C1A4FA3DE8" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B75F992-1E85-491D-99FF-2ABE4228B88D" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DFE3B5A-2AF7-4F0B-9364-A06DD19F4BF7" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C68EFD39-5F34-41DD-9897-A28A6BD190A2" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25A4FBA1-BC5C-43F8-AD20-7D7245382EC8" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.16.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "066B88F9-0617-403E-9B7A-B8CAC6E76D5F" }, { "criteria": "cpe:2.3:a:xine:xine-lib:1.1.16.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D88354B3-C565-480C-B45D-CB172F139E28" } ], "operator": "OR" } ] } ]