Jump to content

Advisories MDVSA-2009:319: xine-lib


paul
 Share

Recommended Posts

Vulnerabilities have been discovered and corrected in xine-lib:

 

Failure on Ogg files manipulation can lead remote attackers to cause

a denial of service by using crafted files (CVE-2008-3231).

 

Failure on manipulation of either MNG or Real or MOD files can lead

remote attackers to cause a denial of service by using crafted files

(CVE: CVE-2008-5233).

 

Heap-based overflow allows remote attackers to execute arbitrary

code by using Quicktime media files holding crafted metadata

(CVE-2008-5234).

 

Heap-based overflow allows remote attackers to execute arbitrary code

by using either crafted Matroska or Real media files (CVE-2008-5236).

 

Failure on manipulation of either MNG or Quicktime files can lead

remote attackers to cause a denial of service by using crafted files

(CVE-2008-5237).

 

Multiple heap-based overflow on input plugins (http, net, smb, dvd,

dvb, rtsp, rtp, pvr, pnm, file, gnome_vfs, mms) allow attackers to

execute arbitrary code by handling that input channels. Further

this problem can even lead attackers to cause denial of service

(CVE-2008-5239).

 

Heap-based overflow allows attackers to execute arbitrary code by using

crafted Matroska media files (MATROSKA_ID_TR_CODECPRIVATE track entry

element). Further a failure on handling of Real media files (CONT_TAG

header) can lead to a denial of service attack (CVE-2008-5240).

 

Integer underflow allows remote attackers to cause denial of service

by using Quicktime media files (CVE-2008-5241).

 

Failure on manipulation of Real media files can lead remote attackers

to cause a denial of service by indexing an allocated buffer with a

certain input value in a crafted file (CVE-2008-5243).

 

Vulnerabilities of unknown impact - possibly buffer overflow - caused

by a condition of video frame preallocation before ascertaining the

required length in V4L video input plugin (CVE-2008-5245).

 

Heap-based overflow allows remote attackers to execute arbitrary

code by using crafted media files. This vulnerability is in the

manipulation of ID3 audio file data tagging mainly used in MP3 file

formats (CVE-2008-5246).

 

Integer overflow in the qt_error parse_trak_atom function in

demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote

attackers to execute arbitrary code via a Quicktime movie file with a

large count value in an STTS atom, which triggers a heap-based buffer

overflow (CVE-2009-1274)

 

Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib

1.1.16.1 allows remote attackers to cause a denial of service (crash)

and possibly execute arbitrary code via a 4X movie file with a large

current_track value, a similar issue to CVE-2009-0385 (CVE-2009-0698)

 

Packages for 2008.0 are being provided due to extended support for

Corporate products.

 

This update fixes these issues.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...