Description
Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Guido Landi · textdoslinux
https://www.exploit-db.com/exploits/5458
References (18)
Core 18
Core References
Vendor Advisory vendor-advisory
x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00536.html
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200808-01.xml
Vendor Advisory vendor-advisory
x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00571.html
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1247/references
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2008/dsa-1586
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30021
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29850
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:177
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5458
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41865
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31393
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:178
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28816
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31372
Vendor Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-635-1
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30337
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30581
Scores
EPSS
0.0793
EPSS Percentile
92.1%
Details
CWE
CWE-119
Status
published
Products (8)
xine/xine-lib
1.1.0
xine/xine-lib
1.1.1
xine/xine-lib
1.1.9
xine/xine-lib
1.1.10
xine/xine-lib
1.1.10.1
xine/xine-lib
1.1.11
xine/xine-lib
1.1.11.1
xine/xine-lib
< 1.1.12
Published
Apr 17, 2008
Tracked Since
Feb 18, 2026