CVE-2004-1188

critical

Description

The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/18638

http://www.mplayerhq.hu/MPlayer/patches/pnm_fix_20041215.diff

http://www.mandriva.com/security/advisories?name=MDKSA-2005:011

http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities

http://cvs.sourceforge.net/viewcvs.py/xine/xine-lib/src/input/pnm.c?r1=1.20&r2=1.21

Details

Source: Mitre, NVD

Published: 2005-01-10

Updated: 2017-07-11

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical