CVE-2008-5616
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
17/12/2008
Last modified:
09/04/2025
Description
Stack-based buffer overflow in the demux_open_vqf function in libmpdemux/demux_vqf.c in MPlayer 1.0 rc2 before r28150 allows remote attackers to execute arbitrary code via a malformed TwinVQ file.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:* | 1.0_rc1 (including) | |
| cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:0.92:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:0.92.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:0.92_cvs:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:1.0_pre2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:1.0_pre3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:1.0_pre3try2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:1.0_pre4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mplayer:mplayer:1.0_pre5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/33136
- http://secunia.com/advisories/34845
- http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150
- http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150
- http://trapkit.de/advisories/TKADV2008-014.txt
- http://www.debian.org/security/2009/dsa-1782
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A013
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A014
- http://www.securityfocus.com/archive/1/499214/100/0/threaded
- http://www.securityfocus.com/bid/32822
- http://secunia.com/advisories/33136
- http://secunia.com/advisories/34845
- http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150
- http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150
- http://trapkit.de/advisories/TKADV2008-014.txt
- http://www.debian.org/security/2009/dsa-1782
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A013
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A014
- http://www.securityfocus.com/archive/1/499214/100/0/threaded
- http://www.securityfocus.com/bid/32822



