cve-2004-1187
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:46
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:46:11.375Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "xine-pnatag-bo(18640)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18640" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff" }, { "name": "20041221 Multiple Vendor Xine version 0.99.2 PNM Handler PNA_TAG Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=176\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:011", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:011" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20\u0026r2=1.21" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "xine-pnatag-bo(18640)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18640" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff" }, { "name": "20041221 Multiple Vendor Xine version 0.99.2 PNM Handler PNA_TAG Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=176\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:011", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:011" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20\u0026r2=1.21" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "xine-pnatag-bo(18640)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18640" }, { "name": "http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff", "refsource": "CONFIRM", "url": "http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff" }, { "name": "20041221 Multiple Vendor Xine version 0.99.2 PNM Handler PNA_TAG Heap Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=176\u0026type=vulnerabilities" }, { "name": "MDKSA-2005:011", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:011" }, { "name": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20\u0026r2=1.21", "refsource": "CONFIRM", "url": "http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20\u0026r2=1.21" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1187", "datePublished": "2004-12-22T05:00:00", "dateReserved": "2004-12-13T00:00:00", "dateUpdated": "2024-08-08T00:46:11.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AD73BA0-D315-4ADA-A942-8DCC2A920B28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"710ACCE6-B3E3-474A-B78B-5A123EC24DE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55D3C3E6-862E-470E-8CEA-4B333B906172\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D6A539-5523-4E52-854A-82CDCDBDFC45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA841B0B-8FA9-45F9-9B60-7C9BD1A92E14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91907AEA-D84F-4DD9-AD22-41E563182FC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D200DE0F-D8BB-460D-928E-E59473F84B38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5103A1E1-670A-4527-9FB8-9D8B0DA506D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"500E5BD7-3F17-455F-8463-50B145128873\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BE4C532-1756-4B2E-94EE-8F8253281F54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E6875BE-67F1-4E0E-A610-7B6EDBAB6431\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E74EBC5-296E-4B20-8BCB-F104D06595AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29A09BDA-DA05-4512-9E39-14819C410CD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5650520-0CCA-47C1-A7B8-8A6129BE6B83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD1FAB76-B1DB-400E-9224-09E82D9A8847\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4D18950-F883-47D1-B95B-6F46F2F6F701\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B5D1CF3-66DF-4000-BEC7-760367856891\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC5DCF4D-41B4-45D3-8F7C-6985A8B15888\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56DE52C9-2381-483F-956D-C83503EBA664\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61348912-55CB-4789-A1ED-9CA7BF77ACB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"367A04A4-10DE-4CDA-BF81-349C65213169\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC260B04-C616-4A6A-9773-D535EA8A45AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72DEB448-0F57-40FD-889E-6C8AC6920C95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE750368-54FD-4CCD-AFF7-B26B3A4BA539\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58476B06-9E48-4649-8761-B32FE01BA7C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76CE8EF1-0578-4E12-A87D-832978ED484D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0DF434D-3BE2-4BCF-A6FC-397475830FDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFA95FC2-2082-4367-AD3D-0F876972E5A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"005EA1B5-7717-4CBD-9D21-249A5A497D51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19A33FCB-47FE-4F2E-9043-1F13805F0F13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE1A9A53-860B-41CF-8BFD-4792775765E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5246E535-1B8F-4BC1-AD1D-9BFA7BF28D52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C247EF56-6E67-41DA-8C49-C9310C42B8E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9790E7B0-E2D3-4DA5-915A-D236446E1B5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4E5CCDF-3472-4994-A47A-5A94D10F1C56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAFC4559-D7E3-4C75-8B79-85A79067E261\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3544B231-8C98-42D1-A2B2-E62109BDD796\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C69FEB8-DFE6-4241-9341-D8A4929F0FF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99D8D224-15C4-4D15-9A04-4A1F3E1F63B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F469DA5D-6020-4490-B671-2CEFB151C736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"283D1C9D-00E5-456E-8E82-52963B9A07F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56D5CAA8-B9CF-4036-9BB1-B6096A0B7A62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C65FB6DA-EDA1-4727-9896-6A27FAB555BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45DC5988-4C25-49CA-BB7C-5933EDD8F460\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B7B24F7-BDE5-4EE7-8141-70777B7BAFB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65ABAD66-13A3-495C-920E-5E39D1EBDB2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEB839B0-408E-4D96-B576-D9300082B7A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DF7BC3F-20B1-461A-A799-8A77F3D8CC8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FEDBE74-5040-4E61-A34A-2BC36A2A129F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B469D7A8-9CF5-4AF7-802F-E43752AF18F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C87793C-6577-4E67-BBFD-768FAF1BF88D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFE9819F-A620-41A6-A102-41746457753F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7D6474F-C678-498C-9A61-287E2FDD8B2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06402BDD-77EA-447A-8C34-E1A0F41D0628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7387773A-81F1-464A-9489-E103C51BED46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A03194CD-2CFA-4F11-90DE-3573BA06B6DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C39D002-E323-423D-8895-9179DFDF6535\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73E621C7-A5BA-4D71-9D57-4311360FF3A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B08810F9-377D-49C4-A9A8-E2EE42EDF2F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AA12911-93D8-4DFE-A31C-FEB9E7F7ADD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C13E4FD-A874-4366-A426-19665B43F1DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75965D14-6EFC-4F1D-B343-FD593FB37048\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2F8891F-7FE9-44F3-95A5-282E8B3BB05D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F146421-8772-4B2C-B202-097BE15F8472\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C8F4701-C5CC-4FBA-AFF6-5AB890306AC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5AF6387-6E37-4310-8893-7228DC01607E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3295F345-26D0-4B23-848F-83CFE067EA01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2915303-7347-4811-B7D2-5AF367081797\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6976E802-011F-44A2-B668-F9D643FC7A86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08B7236E-DCFB-40DB-BFC8-88F8491BBD69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDF4423C-790B-411A-9AEC-2B36DA0140AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B3AA3FD-BB0E-4164-85EB-30613900C4AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44D12F07-097C-4F21-9D97-AF3ABAA1C089\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74D09DD6-7878-4136-AE31-A45CF9234061\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*\", \"matchCriteriaId\": \"A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3528DABD-B821-4D23-AE12-614A9CA92C46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*\", \"matchCriteriaId\": \"9E661D58-18DF-4CCF-9892-F873618F4535\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188.\"}]", "id": "CVE-2004-1187", "lastModified": "2024-11-20T23:50:18.400", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2005-01-10T05:00:00.000", "references": "[{\"url\": \"http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20\u0026r2=1.21\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.idefense.com/application/poi/display?id=176\u0026type=vulnerabilities\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2005:011\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/18640\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20\u0026r2=1.21\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.idefense.com/application/poi/display?id=176\u0026type=vulnerabilities\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2005:011\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/18640\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2004-1187\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-01-10T05:00:00.000\",\"lastModified\":\"2024-11-20T23:50:18.400\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD73BA0-D315-4ADA-A942-8DCC2A920B28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"710ACCE6-B3E3-474A-B78B-5A123EC24DE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D3C3E6-862E-470E-8CEA-4B333B906172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D6A539-5523-4E52-854A-82CDCDBDFC45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA841B0B-8FA9-45F9-9B60-7C9BD1A92E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91907AEA-D84F-4DD9-AD22-41E563182FC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D200DE0F-D8BB-460D-928E-E59473F84B38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5103A1E1-670A-4527-9FB8-9D8B0DA506D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500E5BD7-3F17-455F-8463-50B145128873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE4C532-1756-4B2E-94EE-8F8253281F54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E6875BE-67F1-4E0E-A610-7B6EDBAB6431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E74EBC5-296E-4B20-8BCB-F104D06595AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A09BDA-DA05-4512-9E39-14819C410CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5650520-0CCA-47C1-A7B8-8A6129BE6B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:1.0_pre5try1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD1FAB76-B1DB-400E-9224-09E82D9A8847\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:1.0_pre5try2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D18950-F883-47D1-B95B-6F46F2F6F701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mplayer:mplayer:head_cvs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B5D1CF3-66DF-4000-BEC7-760367856891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC5DCF4D-41B4-45D3-8F7C-6985A8B15888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:0.9.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DE52C9-2381-483F-956D-C83503EBA664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:0.9.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61348912-55CB-4789-A1ED-9CA7BF77ACB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_alpha:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"367A04A4-10DE-4CDA-BF81-349C65213169\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC260B04-C616-4A6A-9773-D535EA8A45AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DEB448-0F57-40FD-889E-6C8AC6920C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE750368-54FD-4CCD-AFF7-B26B3A4BA539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58476B06-9E48-4649-8761-B32FE01BA7C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76CE8EF1-0578-4E12-A87D-832978ED484D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0DF434D-3BE2-4BCF-A6FC-397475830FDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFA95FC2-2082-4367-AD3D-0F876972E5A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005EA1B5-7717-4CBD-9D21-249A5A497D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A33FCB-47FE-4F2E-9043-1F13805F0F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1A9A53-860B-41CF-8BFD-4792775765E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5246E535-1B8F-4BC1-AD1D-9BFA7BF28D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_beta12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C247EF56-6E67-41DA-8C49-C9310C42B8E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9790E7B0-E2D3-4DA5-915A-D236446E1B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4E5CCDF-3472-4994-A47A-5A94D10F1C56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAFC4559-D7E3-4C75-8B79-85A79067E261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3544B231-8C98-42D1-A2B2-E62109BDD796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C69FEB8-DFE6-4241-9341-D8A4929F0FF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D8D224-15C4-4D15-9A04-4A1F3E1F63B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F469DA5D-6020-4490-B671-2CEFB151C736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"283D1C9D-00E5-456E-8E82-52963B9A07F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56D5CAA8-B9CF-4036-9BB1-B6096A0B7A62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C65FB6DA-EDA1-4727-9896-6A27FAB555BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45DC5988-4C25-49CA-BB7C-5933EDD8F460\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B7B24F7-BDE5-4EE7-8141-70777B7BAFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine:1_rc8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65ABAD66-13A3-495C-920E-5E39D1EBDB2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB839B0-408E-4D96-B576-D9300082B7A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF7BC3F-20B1-461A-A799-8A77F3D8CC8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:0.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FEDBE74-5040-4E61-A34A-2BC36A2A129F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_alpha:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B469D7A8-9CF5-4AF7-802F-E43752AF18F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C87793C-6577-4E67-BBFD-768FAF1BF88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE9819F-A620-41A6-A102-41746457753F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D6474F-C678-498C-9A61-287E2FDD8B2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06402BDD-77EA-447A-8C34-E1A0F41D0628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7387773A-81F1-464A-9489-E103C51BED46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A03194CD-2CFA-4F11-90DE-3573BA06B6DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C39D002-E323-423D-8895-9179DFDF6535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E621C7-A5BA-4D71-9D57-4311360FF3A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08810F9-377D-49C4-A9A8-E2EE42EDF2F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AA12911-93D8-4DFE-A31C-FEB9E7F7ADD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C13E4FD-A874-4366-A426-19665B43F1DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75965D14-6EFC-4F1D-B343-FD593FB37048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F8891F-7FE9-44F3-95A5-282E8B3BB05D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F146421-8772-4B2C-B202-097BE15F8472\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8F4701-C5CC-4FBA-AFF6-5AB890306AC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5AF6387-6E37-4310-8893-7228DC01607E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3295F345-26D0-4B23-848F-83CFE067EA01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2915303-7347-4811-B7D2-5AF367081797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc3c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6976E802-011F-44A2-B668-F9D643FC7A86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08B7236E-DCFB-40DB-BFC8-88F8491BBD69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDF4423C-790B-411A-9AEC-2B36DA0140AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B3AA3FD-BB0E-4164-85EB-30613900C4AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44D12F07-097C-4F21-9D97-AF3ABAA1C089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xine:xine-lib:1_rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74D09DD6-7878-4136-AE31-A45CF9234061\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3528DABD-B821-4D23-AE12-614A9CA92C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"9E661D58-18DF-4CCF-9892-F873618F4535\"}]}]}],\"references\":[{\"url\":\"http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20\u0026r2=1.21\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.idefense.com/application/poi/display?id=176\u0026type=vulnerabilities\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:011\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18640\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20\u0026r2=1.21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.idefense.com/application/poi/display?id=176\u0026type=vulnerabilities\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:011\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18640\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.