Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-5616
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-17 Dec, 2008 | 01:30
Updated At-11 Oct, 2018 | 20:56

Stack-based buffer overflow in the demux_open_vqf function in libmpdemux/demux_vqf.c in MPlayer 1.0 rc2 before r28150 allows remote attackers to execute arbitrary code via a malformed TwinVQ file.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

mplayer
mplayer
>>mplayer>>Versions up to 1.0_rc1(inclusive)
cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>0.90
cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>0.90_pre
cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>0.90_rc
cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>0.90_rc4
cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>0.91
cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>0.92
cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>0.92.1
cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>0.92_cvs
cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre1
cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre2
cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre3
cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre3try2
cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre4
cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre5
cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre5try1
cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre5try2
cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre6
cpe:2.3:a:mplayer:mplayer:1.0_pre6:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre7
cpe:2.3:a:mplayer:mplayer:1.0_pre7:*:*:*:*:*:*:*
mplayer
mplayer
>>mplayer>>1.0_pre7try2
cpe:2.3:a:mplayer:mplayer:1.0_pre7try2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/33136cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/34845cve@mitre.org
N/A
http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150cve@mitre.org
N/A
http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150cve@mitre.org
N/A
http://trapkit.de/advisories/TKADV2008-014.txtcve@mitre.org
N/A
http://www.debian.org/security/2009/dsa-1782cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2009:013cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2009:014cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/499214/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/32822cve@mitre.org
N/A
Change History
0Changes found

Details not found