Search for vulnerabilities
Vulnerability details: VCID-4hs6-qm6n-aaaq
Vulnerability ID VCID-4hs6-qm6n-aaaq
Aliases CVE-2008-0485
Summary Array index error in libmpdemux/demux_mov.c in MPlayer 1.0 rc2 and earlier might allow remote attackers to execute arbitrary code via a QuickTime MOV file with a crafted stsc atom tag.
Status Published
Exploitability 2.0
Weighted Severity 8.4
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.17161 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.18468 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.18468 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.18468 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.1883 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.19845 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.20213 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.20213 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.20213 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.20213 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.20213 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.20213 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.20213 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.20213 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.22810 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.22810 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.22810 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
epss 0.22810 https://api.first.org/data/v1/epss?cve=CVE-2008-0485
cvssv2 9.3 https://nvd.nist.gov/vuln/detail/CVE-2008-0485
Data source Exploit-DB
Date added Feb. 4, 2008
Description MPlayer 1.0rc2 - 'demux_mov.c' Remote Code Execution
Ransomware campaign use Known
Source publication date Feb. 4, 2008
Exploit type remote
Platform linux
Source update date Nov. 23, 2016
Source URL https://www.securityfocus.com/bid/27499/info
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2008-0485
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.94475
EPSS Score 0.17161
Published At April 5, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.