Joined: 12 May 2004
|Posted: Wed Apr 26, 2006 5:26 pm Post subject: [ GLSA 200604-16 ] xine-lib: Buffer overflow vulnerability
|Gentoo Linux Security Advisory
Title: xine-lib: Buffer overflow vulnerability (GLSA 200604-16)
Date: April 26, 2006
xine-lib contains a buffer overflow vulnerability which may lead to the execution of arbitrary code.
xine-lib is the xine core engine. xine is a free multimedia player. It plays CDs, DVDs, and VCDs, and can also decode other common multimedia formats.
Vulnerable: < 1.1.2_pre20060328-r1
Unaffected: >= 1.1.2_pre20060328-r1
Architectures: All supported architectures
Federico L. Bossi Bonin discovered that when handling MPEG streams xine-lib fails to make a proper boundary check of the input data supplied by the user before copying it to an insufficiently sized memory buffer.
A remote attacker could entice a user to play a specially-crafted MPEG file, resulting in the execution of arbitrary code with the permissions of the user running the application.
There is no known workaround at this time.
All xine-lib users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2_pre20060328-r1"
Last edited by GLSA on Sun May 07, 2006 5:01 pm; edited 1 time in total