|Title:||DivX Web Player Buffer Overflow Vulnerability|
|Summary:||Check for the version of DivX Web Player|
Overview: This host is running DivX Web Player which is prone to buffer
This flaw is due to the boundary checking error while processing Stream
Format 'STRF' chunks which causes heap overflow.
Impact: Successful exploitation will let the attacker execute arbitrary
codes within the context of the application by tricking a user into
opening a crafted DivX file.
Impact level: System
DivX Web Player 184.108.40.206 and prior on Windows.
Fix: Update to version 220.127.116.11
BugTraq ID: 34523|
Common Vulnerability Exposure (CVE) ID: CVE-2008-5259
Bugtraq: 20090415 Secunia Research: DivX Web Player Stream Format Chunk Buffer Overflow (Google Search)
XForce ISS Database: divxwebplayer-strf-bo(49908)
|Copyright||Copyright (C) 2009 SecPod|
|This is only one of 40605 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.