Joined: 12 May 2004
|Posted: Sat Dec 09, 2006 8:26 am Post subject: [ GLSA 200612-02 ] xine-lib: Buffer overflow
|Gentoo Linux Security Advisory
Title: xine-lib: Buffer overflow (GLSA 200612-02)
Date: December 09, 2006
xine-lib is vulnerable to a buffer overflow in the Real Media input plugin, which could lead to the execution of arbitrary code.
xine is a portable and reusable multimedia playback engine. xine-lib is xine's core engine.
Vulnerable: < 1.1.2-r3
Unaffected: >= 1.1.2-r3
Architectures: All supported architectures
A possible buffer overflow has been reported in the Real Media input plugin.
An attacker could exploit this vulnerability by enticing a user into loading a specially crafted stream with xine or an application using xine-lib. This can lead to a Denial of Service and possibly the execution of arbitrary code with the rights of the user running the application.
There is no known workaround at this time.
All xine-lib users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r3"