Name | CVE-2004-1188 |
Description | The pnm_get_chunk function in xine 0.99.2 and earlier, and other packages such as MPlayer that use the same code, does not properly verify that the chunk size is less than the PREAMBLE_SIZE, which causes a read operation with a negative length that leads to a buffer overflow via (1) RMF_TAG, (2) DATA_TAG, (3) PROP_TAG, (4) MDPR_TAG, and (5) CONT_TAG values, a different vulnerability than CVE-2004-1187. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
mplayer (PTS) | stretch | 2:1.3.0-6 | fixed |
buster (security), buster, buster (lts) | 2:1.3.0-8+deb10u1 | fixed | |
bullseye | 2:1.4+ds1-1+deb11u1 | fixed | |
bookworm | 2:1.5+svn38408-1 | fixed | |
sid | 2:1.5+svn38542-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
mplayer | source | (unstable) | (not affected) | |||
xine-lib | source | (unstable) | 1-rc8-1 |
- mplayer <not-affected> (fixed in 1.0-pre5 which precedes the version included in etch)