{"id":"CVE-2008-1686","details":"Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.","modified":"2026-01-27T04:08:38.970556Z","published":"2008-04-08T18:05:00Z","withdrawn":"2026-01-27T04:08:38.970556Z","related":["openSUSE-SU-2024:10610-1","openSUSE-SU-2024:10829-1","openSUSE-SU-2024:11503-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/29672"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29727"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29835"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29845"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29854"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29866"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29878"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29880"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29881"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29882"},{"type":"ADVISORY","url":"http://secunia.com/advisories/29898"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30104"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30117"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30119"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30337"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30353"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30358"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30581"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30717"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31393"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200804-17.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1586"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:092"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:093"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:094"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:124"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2008_13_sr.html"},{"type":"ADVISORY","url":"http://www.ocert.org/advisories/ocert-2008-004.html"},{"type":"ADVISORY","url":"http://www.ocert.org/advisories/ocert-2008-2.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-611-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-611-2"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-611-3"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-635-1"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1187/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1228/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1268/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1269/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1300/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1301/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1302/references"},{"type":"ARTICLE","url":"http://blog.kfish.org/2008/04/release-libfishsound-091.html"},{"type":"FIX","url":"http://www.debian.org/security/2008/dsa-1584"},{"type":"FIX","url":"http://www.debian.org/security/2008/dsa-1585"},{"type":"FIX","url":"http://www.securityfocus.com/bid/28665"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html"},{"type":"WEB","url":"http://lists.xiph.org/pipermail/speex-dev/2008-April/006636.html"},{"type":"WEB","url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.460836"},{"type":"WEB","url":"http://sourceforge.net/project/shownotes.php?release_id=592185"},{"type":"WEB","url":"http://sourceforge.net/project/shownotes.php?release_id=592185&group_id=9655"},{"type":"WEB","url":"http://www.metadecks.org/software/sweep/news.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2008-0235.html"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/491009/100/0/threaded"},{"type":"WEB","url":"http://www.securitytracker.com/id?1019875"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41684"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10026"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00244.html"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00287.html"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00357.html"}],"schema_version":"1.7.3"}