GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Jan 10, 2006 9:26 pm Post subject: [ GLSA 200601-06 ] xine-lib, FFmpeg: Heap-based buffer overf |
|
|
Gentoo Linux Security Advisory
Title: xine-lib, FFmpeg: Heap-based buffer overflow (GLSA 200601-06)
Severity: normal
Exploitable: remote
Date: January 10, 2006
Bug(s): #115849, #116181
ID: 200601-06
Synopsis
xine-lib and FFmpeg are vulnerable to a buffer overflow that may be
exploited by attackers to execute arbitrary code.
Background
xine is a GPL high-performance, portable and reusable multimedia
playback engine. xine-lib is xine's core engine. FFmpeg is a very fast
video and audio converter and is used in xine-lib.
Affected Packages
Package: media-libs/xine-lib
Vulnerable: < 1.1.1-r3
Unaffected: >= 1.1.1-r3
Architectures: All supported architectures
Package: media-video/ffmpeg
Vulnerable: < 0.4.9_p20051216
Unaffected: >= 0.4.9_p20051216
Architectures: All supported architectures
Description
Simon Kilvington has reported a vulnerability in FFmpeg
libavcodec. The flaw is due to a buffer overflow error in the
"avcodec_default_get_buffer()" function. This function doesn't properly
handle specially crafted PNG files as a result of a heap overflow.
Impact
A remote attacker could entice a user to run an FFmpeg based
application on a maliciously crafted PNG file, resulting in the
execution of arbitrary code with the permissions of the user running
the application.
Workaround
There is no known workaround at this time.
Resolution
All xine-lib users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.1-r3" |
All FFmpeg users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/ffmpeg-0.4.9_p20051216" |
References
CVE-2005-4048
Original advisory
Last edited by GLSA on Wed Sep 25, 2013 4:21 am; edited 3 times in total |
|