[xine-lib] [DSA-1536-1] several vulnerabilities
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
xine-lib (Debian) |
Fix Released
|
Unknown
|
|||
xine-lib (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Dapper |
Fix Released
|
High
|
Jamie Strandboge | ||
Feisty |
Fix Released
|
High
|
Jamie Strandboge | ||
Gutsy |
Fix Released
|
High
|
Jamie Strandboge |
Bug Description
References:
DSA-1536-1 (http://
Quoting:
"Several local vulnerabilities have been discovered in Xine, a
media player library, allowed for a denial of service or arbitrary code
execution, which could be exploited through viewing malicious content.
The Common Vulnerabilities and Exposures project identifies the following
problems:
CVE-2007-1246 / CVE-2007-1387
The DMO_VideoDecode
memcpy, which allows user-assisted remote attackers to cause a buffer overflow
and possibly execute arbitrary code (applies to sarge only).
CVE-2008-0073
Array index error in the sdpplin_parse function allows remote RTSP servers
to execute arbitrary code via a large streamid SDP parameter.
CVE-2008-0486
Array index vulnerability in libmpdemux/
attackers to execute arbitrary code via a crafted FLAC tag, which triggers
a buffer overflow (applies to etch only).
CVE-2008-1161
Buffer overflow in the Matroska demuxer allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via a Matroska
file with invalid frame sizes."
CVE-2008-0486 has already been reported as Bug#195700.
CVE-2008-1161 has already been reported as Bug#203474.
Changed in xine-lib: | |
status: | Unknown → Fix Released |
Changed in xine-lib: | |
assignee: | nobody → jdstrand |
status: | New → Confirmed |
assignee: | nobody → jdstrand |
importance: | Undecided → High |
status: | New → Confirmed |
importance: | Undecided → High |
assignee: | nobody → jdstrand |
importance: | Undecided → High |
status: | New → Confirmed |
Changed in xine-lib: | |
status: | Confirmed → Fix Released |
status: | Confirmed → Fix Released |
status: | Confirmed → Fix Released |
we have the debian package already in the ubuntu hardy archives, so fixed for hardy. earlier versions of ubuntu might be affected, though.