[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2009:319 -- Mandriva xine-lib

ID: oval:org.secpod.oval:def:300625Date: (C)2012-01-07   (M)2023-11-09
Class: PATCHFamily: unix




Vulnerabilities have been discovered and corrected in xine-lib: Failure on Ogg files manipulation can lead remote attackers to cause a denial of service by using crafted files . Failure on manipulation of either MNG or Real or MOD files can lead remote attackers to cause a denial of service by using crafted files . Heap-based overflow allows remote attackers to execute arbitrary code by using Quicktime media files holding crafted metadata . Heap-based overflow allows remote attackers to execute arbitrary code by using either crafted Matroska or Real media files . Failure on manipulation of either MNG or Quicktime files can lead remote attackers to cause a denial of service by using crafted files . Multiple heap-based overflow on input plugins allow attackers to execute arbitrary code by handling that input channels. Further this problem can even lead attackers to cause denial of service . Heap-based overflow allows attackers to execute arbitrary code by using crafted Matroska media files . Further a failure on handling of Real media files can lead to a denial of service attack . Integer underflow allows remote attackers to cause denial of service by using Quicktime media files . Failure on manipulation of Real media files can lead remote attackers to cause a denial of service by indexing an allocated buffer with a certain input value in a crafted file . Vulnerabilities of unknown impact - possibly buffer overflow - caused by a condition of video frame preallocation before ascertaining the required length in V4L video input plugin . Heap-based overflow allows remote attackers to execute arbitrary code by using crafted media files. This vulnerability is in the manipulation of ID3 audio file data tagging mainly used in MP3 file formats . Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow Integer overflow in the 4xm demuxer in xine-lib 1.1.16.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a 4X movie file with a large current_track value, a similar issue to CVE-2009-0385 Packages for 2008.0 are being provided due to extended support for Corporate products. This update fixes these issues.

Platform:
Mandriva Linux 2008.0
Product:
xine-lib
Reference:
MDVSA-2009:319
CVE-2009-1274
CVE-2009-0698
CVE-2008-5246
CVE-2008-5245
CVE-2008-5243
CVE-2008-5241
CVE-2008-5240
CVE-2008-5239
CVE-2008-5237
CVE-2008-5236
CVE-2008-5234
CVE-2008-5233
CVE-2008-3231
CVE    13
CVE-2008-3231
CVE-2008-5243
CVE-2008-5233
CVE-2008-5234
...
CPE    1
cpe:/o:mandriva:linux:2008.0

© SecPod Technologies