CVE-2008-5032

Source
https://nvd.nist.gov/vuln/detail/CVE-2008-5032
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2008-5032.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2008-5032
Published
2008-11-10T16:15:12Z
Modified
2025-04-09T00:30:58Z
Downstream
Summary
[none]
Details

Stack-based buffer overflow in VideoLAN VLC media player 0.5.0 through 0.9.5 might allow user-assisted attackers to execute arbitrary code via the header of an invalid CUE image file, related to modules/access/vcd/cdrom.c. NOTE: this identifier originally included an issue related to RealText, but that issue has been assigned a separate identifier, CVE-2008-5036.

References

Affected packages

Debian:11 / vlc

Package

Name
vlc
Purl
pkg:deb/debian/vlc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.6.h-5

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / vlc

Package

Name
vlc
Purl
pkg:deb/debian/vlc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.6.h-5

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / vlc

Package

Name
vlc
Purl
pkg:deb/debian/vlc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.6.h-5

Ecosystem specific

{
    "urgency": "medium"
}