[xine-lib] [CVE-2008-0225] insufficient input sanitising during the handling of RTSP streams
Bug #185034 reported by
disabled.user
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
xine-lib (Gentoo Linux) |
Fix Released
|
Medium
|
|||
xine-lib (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Dapper |
Fix Released
|
Undecided
|
Unassigned | ||
Feisty |
Fix Released
|
Undecided
|
Unassigned | ||
Gutsy |
Fix Released
|
Undecided
|
Jamie Strandboge |
Bug Description
References:
DSA-1472-1 (http://
Quoting:
"Luigi Auriemma discovered that the Xine media player library performed
insufficient input sanitising during the handling of RTSP streams,
which could lead to the execution of arbitrary code."
Changed in xine-lib: | |
status: | Unknown → Fix Released |
Changed in xine-lib: | |
status: | New → Invalid |
status: | New → Fix Released |
status: | New → Fix Released |
assignee: | nobody → jdstrand |
status: | New → Fix Released |
Changed in xine-lib (Gentoo Linux): | |
importance: | Unknown → Medium |
To post a comment you must log in.
The vulnerabilities are caused due to boundary errors within the "rmff_dump_cont()" function in input/libreal/ rmff.c when processing the SDP "Title", "Author", Copyright", and "Abstract" attributes. These can be exploited to cause a heap-based buffer overflow by tricking the user into connecting to a malicious RTSP server.
Successful exploitation may allow execution of arbitrary code.
The vulnerabilities are confirmed in version 1.1.9. Other versions may also be affected.
Solution: no upstream fix avaible, so "Do not connect to untrusted streaming servers."...