Buffer overflow in the HTTP Plugin (xineplug_inp_http.so) for xine-lib 1.1.1 allows remote attackers to cause a denial of service (application crash) via a long reply from an HTTP server, as demonstrated using gxine 0.5.6.
Link | Tags |
---|---|
http://www.debian.org/security/2006/dsa-1105 | vendor advisory |
http://www.osvdb.org/25936 | vdb entry |
http://secunia.com/advisories/20369 | exploit third party advisory vendor advisory |
http://secunia.com/advisories/20942 | third party advisory |
http://secunia.com/advisories/20766 | third party advisory |
http://security.gentoo.org/glsa/glsa-200609-08.xml | vendor advisory |
http://www.securityfocus.com/bid/18187 | vdb entry exploit |
http://secunia.com/advisories/20549 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26972 | vdb entry |
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html | vendor advisory |
https://usn.ubuntu.com/295-1/ | vendor advisory |
http://secunia.com/advisories/20828 | third party advisory |
https://www.exploit-db.com/exploits/1852 | exploit |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:108 | vendor advisory |
http://secunia.com/advisories/21919 | third party advisory |