libmms -- stack-based buffer overflow
Mitre CVE reports:
Stack-based buffer overflow in libmms, as used by (a)
MiMMS 0.0.9 and (b) xine-lib 1.1.0 and earlier, allows
remote attackers to cause a denial of service (application
crash) and possibly execute arbitrary code via the (1)
send_command, (2) string_utf16, (3) get_data, and (4)
get_media_packet functions, and possibly other functions.
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright