Search for vulnerabilities
Vulnerability details: VCID-2jv9-6bgw-aaah
Vulnerability ID VCID-2jv9-6bgw-aaah
Aliases CVE-2008-1558
Summary Uncontrolled array index in the sdpplin_parse function in stream/realrtsp/sdpplin.c in MPlayer 1.0 rc2 allows remote attackers to overwrite memory and execute arbitrary code via a large streamid SDP parameter. NOTE: this issue has been referred to as an integer overflow.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.20772 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21937 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.21939 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.29325 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.30293 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.45603 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.45603 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.46365 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
epss 0.46365 https://api.first.org/data/v1/epss?cve=CVE-2008-1558
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2008-1558
Data source Exploit-DB
Date added March 24, 2008
Description MPlayer 1.0 rc2 - 'sdpplin_parse()' Array Indexing Buffer Overflow (PoC)
Ransomware campaign use Known
Source publication date March 25, 2008
Exploit type dos
Platform linux
Source update date Nov. 23, 2016
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2008-1558
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.95125
EPSS Score 0.20772
Published At April 4, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.