Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-07T17:43:28.256Z
Reserved: 2006-05-04T00:00:00
Link: CVE-2006-2200

No data.

Status : Modified
Published: 2006-06-28T01:45:00.000
Modified: 2024-11-21T00:10:46.747
Link: CVE-2006-2200

No data.