{"api_version":"1","generated_at":"2026-04-23T05:04:47+00:00","cve":"CVE-2008-5246","urls":{"html":"https://cve.report/CVE-2008-5246","api":"https://cve.report/api/cve/CVE-2008-5246.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-5246","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-5246"},"summary":{"title":"CVE-2008-5246","description":"Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.","state":"PUBLISHED","assigner":"mitre","published_at":"2008-11-26 01:30:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-119","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"9.3","severity":"","vector":"AV:N/AC:M/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://sourceforge.net/project/shownotes.php?release_id=619869","name":"http://sourceforge.net/project/shownotes.php?release_id=619869","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SourceForge.net: Files","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/2382","name":"http://www.vupen.com/english/advisories/2008/2382","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1020703","name":"http://securitytracker.com/id?1020703","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - xine-lib Bugs in Processing Media Files Lets Remote Users Deny Service and Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html","name":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[security-announce] SUSE Security Summary Report: SUSE-SR:2009:004","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44468","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44468","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/30698","name":"http://www.securityfocus.com/bid/30698","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"xine-lib 1.1.14 Multiple Remote Buffer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:020","name":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:020","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Support / Security / Advisories /  / MDVSA-2009:020 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://osvdb.org/47677","name":"http://osvdb.org/47677","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-5246","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5246","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"0.9.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc0a","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc3a","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc3b","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc3c","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc4a","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc6a","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc7","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1","cpe7":"rc8","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.0.3a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.10.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.11.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1.1.9.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"1_beta9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5246","vulnerable":"1","versionEndIncluding":"1.1.14","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xine","cpe5":"xine-lib","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T10:49:12.366Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"1020703","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1020703"},{"name":"xinelib-srcdemuxersid3-bo(44468)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44468"},{"name":"47677","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/47677"},{"name":"SUSE-SR:2009:004","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"},{"name":"ADV-2008-2382","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/2382"},{"name":"MDVSA-2009:020","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"},{"name":"30698","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/30698"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://sourceforge.net/project/shownotes.php?release_id=619869"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-08-15T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-07T12:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"1020703","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1020703"},{"name":"xinelib-srcdemuxersid3-bo(44468)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44468"},{"name":"47677","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/47677"},{"name":"SUSE-SR:2009:004","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"},{"name":"ADV-2008-2382","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/2382"},{"name":"MDVSA-2009:020","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"},{"name":"30698","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/30698"},{"tags":["x_refsource_CONFIRM"],"url":"http://sourceforge.net/project/shownotes.php?release_id=619869"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-5246","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"1020703","refsource":"SECTRACK","url":"http://securitytracker.com/id?1020703"},{"name":"xinelib-srcdemuxersid3-bo(44468)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44468"},{"name":"47677","refsource":"OSVDB","url":"http://osvdb.org/47677"},{"name":"SUSE-SR:2009:004","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"},{"name":"ADV-2008-2382","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/2382"},{"name":"MDVSA-2009:020","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:020"},{"name":"30698","refsource":"BID","url":"http://www.securityfocus.com/bid/30698"},{"name":"http://sourceforge.net/project/shownotes.php?release_id=619869","refsource":"CONFIRM","url":"http://sourceforge.net/project/shownotes.php?release_id=619869"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-5246","datePublished":"2008-11-26T01:00:00.000Z","dateReserved":"2008-11-25T00:00:00.000Z","dateUpdated":"2024-08-07T10:49:12.366Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-11-26 01:30:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-119","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.14","matchCriteriaId":"5EA01448-09E3-4DA9-A817-BFD7A4460F66"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*","matchCriteriaId":"1DF7BC3F-20B1-461A-A799-8A77F3D8CC8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*","matchCriteriaId":"BC32E976-3FB3-44DE-89EE-FF0E89D97090"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*","matchCriteriaId":"336D216E-5C30-4328-A422-DE134CABA091"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*","matchCriteriaId":"39B6FDDB-139E-4CAC-A1C9-69E4AB542357"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*","matchCriteriaId":"CCC58298-4DD7-47C4-BFA7-04596B21D646"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*","matchCriteriaId":"EB72C6CE-4D90-42FD-BFAF-AB31EBC34BF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*","matchCriteriaId":"3AA7BF0D-063D-4FD4-9AF2-69A0DF31579D"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*","matchCriteriaId":"5BEFC0C7-1D8D-421B-B193-8A574AC8C712"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*","matchCriteriaId":"42736C09-AF59-45F7-A324-2A725F8C0AEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*","matchCriteriaId":"30F3E90C-01A5-4085-8BA4-B5FA05BEA791"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*","matchCriteriaId":"91ACDCA2-F0CD-4133-85A1-FC95E703CB90"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*","matchCriteriaId":"58B3AEE5-1A56-464E-9EB2-F06E25FA5D90"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*","matchCriteriaId":"EEB5AC92-03F5-44F2-89CC-B6E8BA69C55C"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*","matchCriteriaId":"5AC68CC2-969C-4596-AA38-AE10BFE1D5BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*","matchCriteriaId":"B8D402CB-4DED-4525-AF38-B5EC73C39E55"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"A905719D-4520-4374-B3A7-55034728B85C"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"2899EF34-824B-4893-8636-64A83EC5885B"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*","matchCriteriaId":"8EB8D295-B589-4E88-8FEE-DDD1591D9189"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"FAB10333-6C25-4359-BB3F-D76468170825"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"2377493B-8CC0-414B-AA5F-B7777C852195"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"877230F8-6040-4CE3-A882-1290D19D27CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*","matchCriteriaId":"401AE3C4-3829-487D-B66E-F71705BDD3FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"46BF90AB-3B32-4899-8179-BDB9EB449760"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*","matchCriteriaId":"69CE0C90-2DD1-49D2-AE4C-1D21B81EF812"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*","matchCriteriaId":"3F2AF7B5-09C3-4E32-B981-E0D9F88E387C"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*","matchCriteriaId":"C94CF963-7DA9-455C-BB7E-2EE9AACD6B51"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*","matchCriteriaId":"E515D538-80FA-4069-B466-1EC4F84EE5A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*","matchCriteriaId":"64546B22-3230-413A-BE51-E51F54B4A39B"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*","matchCriteriaId":"686115E3-6BC0-4E9E-A0A7-9896F639FDE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*","matchCriteriaId":"AFC149FA-B916-4844-AD98-B7827116C803"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*","matchCriteriaId":"D2BBF4E9-6090-4ED3-8A12-09396E660505"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*","matchCriteriaId":"AA642532-365F-4981-BA09-A56D3628271C"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*","matchCriteriaId":"C34F27CC-0D88-42C0-93B4-87C1A4FA3DE8"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*","matchCriteriaId":"7B75F992-1E85-491D-99FF-2ABE4228B88D"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*","matchCriteriaId":"1DFE3B5A-2AF7-4F0B-9364-A06DD19F4BF7"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*","matchCriteriaId":"4C87793C-6577-4E67-BBFD-768FAF1BF88D"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*","matchCriteriaId":"DFE9819F-A620-41A6-A102-41746457753F"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*","matchCriteriaId":"A7D6474F-C678-498C-9A61-287E2FDD8B2D"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*","matchCriteriaId":"06402BDD-77EA-447A-8C34-E1A0F41D0628"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*","matchCriteriaId":"7387773A-81F1-464A-9489-E103C51BED46"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*","matchCriteriaId":"A03194CD-2CFA-4F11-90DE-3573BA06B6DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*","matchCriteriaId":"1C39D002-E323-423D-8895-9179DFDF6535"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*","matchCriteriaId":"73E621C7-A5BA-4D71-9D57-4311360FF3A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*","matchCriteriaId":"B08810F9-377D-49C4-A9A8-E2EE42EDF2F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*","matchCriteriaId":"6AA12911-93D8-4DFE-A31C-FEB9E7F7ADD6"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*","matchCriteriaId":"9C13E4FD-A874-4366-A426-19665B43F1DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*","matchCriteriaId":"75965D14-6EFC-4F1D-B343-FD593FB37048"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"5246","Ordinal":"1","Title":"CVE-2008-5246","CVE":"CVE-2008-5246","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"5246","Ordinal":"1","NoteData":"Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.","Type":"Description","Title":"CVE-2008-5246"},{"CveYear":"2008","CveId":"5246","Ordinal":"2","NoteData":"2008-11-25","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"5246","Ordinal":"3","NoteData":"2017-08-07","Type":"Other","Title":"Modified"}]}}}