Buffer overflow in demuxers/demux_asf.c (aka the ASF demuxer) in the xineplug_dmx_asf.so plugin in xine-lib before 1.1.10 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a crafted ASF header. NOTE: this issue leads to a crash when an attack uses the CVE-2006-1664 exploit code, but it is different from CVE-2006-1664.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://xinehq.de/index.php/security | x_refsource_CONFIRM |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/41019 | vdb-entry x_refsource_XF |
| http://secunia.com/advisories/31393 | third-party-advisory x_refsource_SECUNIA |
| http://xinehq.de/index.php/news | x_refsource_CONFIRM |
| http://security.gentoo.org/glsa/glsa-200802-12.xml | vendor-advisory x_refsource_GENTOO |
| http://sourceforge.net/project/shownotes.php?group_id=9655&release_id=571608 | x_refsource_CONFIRM |
| http://bugs.gentoo.org/show_bug.cgi?id=208100 | x_refsource_CONFIRM |
| http://www.mandriva.com/security/advisories?name=MDVSA-2008:178 | vendor-advisory x_refsource_MANDRIVA |
| http://secunia.com/advisories/29141 | third-party-advisory x_refsource_SECUNIA |
| http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset%3Bnode=fb6d089b520dca199ef16a046da28c50c984c2d2%3Bstyle=gitweb | x_refsource_CONFIRM |
| https://www.exploit-db.com/exploits/1641 | exploit x_refsource_EXPLOIT-DB |
| http://www.ubuntu.com/usn/usn-635-1 | vendor-advisory x_refsource_UBUNTU |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|