[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:178 -- Mandriva xine-lib

ID: oval:org.secpod.oval:def:301288Date: (C)2012-01-07   (M)2023-11-09
Class: PATCHFamily: unix




Alin Rad Pop found an array index vulnerability in the SDP parser of xine-lib. If a user or automated system were tricked into opening a malicious RTSP stream, a remote attacker could possibly execute arbitrary code with the privileges of the user using the program . The ASF demuxer in xine-lib did not properly check the length of ASF headers. If a user was tricked into opening a crafted ASF file, a remote attacker could possibly cause a denial of service or execute arbitrary code with the privileges of the user using the program . The Matroska demuxer in xine-lib did not properly verify frame sizes, which could possibly lead to the execution of arbitrary code if a user opened a crafted ASF file . Luigi Auriemma found multiple integer overflows in xine-lib. If a user was tricked into opening a crafted FLV, MOV, RM, MVE, MKV, or CAK file, a remote attacker could possibly execute arbitrary code with the privileges of the user using the program . Guido Landi found A stack-based buffer overflow in xine-lib that could allow a remote attacker to cause a denial of service and potentially execute arbitrary code via a long NSF title . The updated packages have been patched to correct this issue.

Platform:
Mandriva Linux 2008.0
Product:
xine-lib
Reference:
MDVSA-2008:178
CVE-2008-0073
CVE-2008-1110
CVE-2008-1161
CVE-2008-1482
CVE-2008-1878
CVE    5
CVE-2008-0073
CVE-2008-1161
CVE-2008-1110
CVE-2008-1482
...
CPE    1
cpe:/o:mandriva:linux:2008.0

© SecPod Technologies