CVE-2004-1187

Current Description

Heap-based buffer overflow in the pnm_get_chunk function for xine 0.99.2, and other packages such as MPlayer that use the same code, allows remote attackers to execute arbitrary code via long PNA_TAG values, a different vulnerability than CVE-2004-1188.

Referenced by CVEs:CVE-2004-1188

Basic Data

PublishedJanuary 10, 2005
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMplayerMplayer0.90*******
    2.3ApplicationMplayerMplayer0.90_pre*******
    2.3ApplicationMplayerMplayer0.90_rc*******
    2.3ApplicationMplayerMplayer0.90_rc4*******
    2.3ApplicationMplayerMplayer0.91*******
    2.3ApplicationMplayerMplayer0.92*******
    2.3ApplicationMplayerMplayer0.92.1*******
    2.3ApplicationMplayerMplayer0.92_cvs*******
    2.3ApplicationMplayerMplayer1.0_pre1*******
    2.3ApplicationMplayerMplayer1.0_pre2*******
    2.3ApplicationMplayerMplayer1.0_pre3*******
    2.3ApplicationMplayerMplayer1.0_pre3try2*******
    2.3ApplicationMplayerMplayer1.0_pre4*******
    2.3ApplicationMplayerMplayer1.0_pre5*******
    2.3ApplicationMplayerMplayer1.0_pre5try1*******
    2.3ApplicationMplayerMplayer1.0_pre5try2*******
    2.3ApplicationMplayerMplayerhead_cvs*******
    2.3ApplicationXineXine0.9.8*******
    2.3ApplicationXineXine0.9.13*******
    2.3ApplicationXineXine0.9.18*******
    2.3ApplicationXineXine1_alpha*******
    2.3ApplicationXineXine1_beta1*******
    2.3ApplicationXineXine1_beta2*******
    2.3ApplicationXineXine1_beta3*******
    2.3ApplicationXineXine1_beta4*******
    2.3ApplicationXineXine1_beta5*******
    2.3ApplicationXineXine1_beta6*******
    2.3ApplicationXineXine1_beta7*******
    2.3ApplicationXineXine1_beta8*******
    2.3ApplicationXineXine1_beta9*******
    2.3ApplicationXineXine1_beta10*******
    2.3ApplicationXineXine1_beta11*******
    2.3ApplicationXineXine1_beta12*******
    2.3ApplicationXineXine1_rc0*******
    2.3ApplicationXineXine1_rc0a*******
    2.3ApplicationXineXine1_rc1*******
    2.3ApplicationXineXine1_rc2*******
    2.3ApplicationXineXine1_rc3*******
    2.3ApplicationXineXine1_rc3a*******
    2.3ApplicationXineXine1_rc3b*******
    2.3ApplicationXineXine1_rc4*******
    2.3ApplicationXineXine1_rc5*******
    2.3ApplicationXineXine1_rc6*******
    2.3ApplicationXineXine1_rc6a*******
    2.3ApplicationXineXine1_rc7*******
    2.3ApplicationXineXine1_rc8*******
    2.3ApplicationXineXine-lib0.9.8*******
    2.3ApplicationXineXine-lib0.9.13*******
    2.3ApplicationXineXine-lib0.99*******
    2.3ApplicationXineXine-lib1_alpha*******
    2.3ApplicationXineXine-lib1_beta1*******
    2.3ApplicationXineXine-lib1_beta2*******
    2.3ApplicationXineXine-lib1_beta3*******
    2.3ApplicationXineXine-lib1_beta4*******
    2.3ApplicationXineXine-lib1_beta5*******
    2.3ApplicationXineXine-lib1_beta6*******
    2.3ApplicationXineXine-lib1_beta7*******
    2.3ApplicationXineXine-lib1_beta8*******
    2.3ApplicationXineXine-lib1_beta9*******
    2.3ApplicationXineXine-lib1_beta10*******
    2.3ApplicationXineXine-lib1_beta11*******
    2.3ApplicationXineXine-lib1_beta12*******
    2.3ApplicationXineXine-lib1_rc0*******
    2.3ApplicationXineXine-lib1_rc1*******
    2.3ApplicationXineXine-lib1_rc2*******
    2.3ApplicationXineXine-lib1_rc3*******
    2.3ApplicationXineXine-lib1_rc3a*******
    2.3ApplicationXineXine-lib1_rc3b*******
    2.3ApplicationXineXine-lib1_rc3c*******
    2.3ApplicationXineXine-lib1_rc4*******
    2.3ApplicationXineXine-lib1_rc5*******
    2.3ApplicationXineXine-lib1_rc6*******
    2.3ApplicationXineXine-lib1_rc6a*******
    2.3ApplicationXineXine-lib1_rc7*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMandrakesoftMandrake Linux10.0*******
    2.3OSMandrakesoftMandrake Linux10.0*amd64*****
    2.3OSMandrakesoftMandrake Linux10.1*******
    2.3OSMandrakesoftMandrake Linux10.1*x86_64*****

Vulnerable Software List

VendorProductVersions
Xine Xine-lib 0.9.13, 0.9.8, 0.99, 1_alpha, 1_beta1, 1_beta10, 1_beta11, 1_beta12, 1_beta2, 1_beta3, 1_beta4, 1_beta5, 1_beta6, 1_beta7, 1_beta8, 1_beta9, 1_rc0, 1_rc1, 1_rc2, 1_rc3, 1_rc3a, 1_rc3b, 1_rc3c, 1_rc4, 1_rc5, 1_rc6, 1_rc6a, 1_rc7
Xine Xine 0.9.13, 0.9.18, 0.9.8, 1_alpha, 1_beta1, 1_beta10, 1_beta11, 1_beta12, 1_beta2, 1_beta3, 1_beta4, 1_beta5, 1_beta6, 1_beta7, 1_beta8, 1_beta9, 1_rc0, 1_rc0a, 1_rc1, 1_rc2, 1_rc3, 1_rc3a, 1_rc3b, 1_rc4, 1_rc5, 1_rc6, 1_rc6a, 1_rc7, 1_rc8
Mandrakesoft Mandrake Linux 10.0, 10.1
Mplayer Mplayer 0.90, 0.90_pre, 0.90_rc, 0.90_rc4, 0.91, 0.92, 0.92.1, 0.92_cvs, 1.0_pre1, 1.0_pre2, 1.0_pre3, 1.0_pre3try2, 1.0_pre4, 1.0_pre5, 1.0_pre5try1, 1.0_pre5try2, head_cvs

References

NameSourceURLTags
http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21CONFIRM
20041221 Multiple Vendor Xine version 0.99.2 PNM Handler PNA_TAG Heap Overflow Vulnerabilityhttp://www.idefense.com/application/poi/display?id=176&type=vulnerabilitiesIDEFENSEPatch Vendor Advisory
MDKSA-2005:011http://www.mandriva.com/security/advisories?name=MDKSA-2005:011MANDRAKE
http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diffhttp://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diffCONFIRM
xine-pnatag-bo(18640)https://exchange.xforce.ibmcloud.com/vulnerabilities/18640XF