USN-763-1 -- xine-lib vulnerabilitiesID: oval:org.secpod.oval:def:700312 | Date: (C)2011-05-13 (M)2021-09-11 |
Class: PATCH | Family: unix |
It was discovered that the QT demuxer in xine-lib did not correctly handle a large count value in an STTS atom, resulting in a heap-based buffer overflow. If a user or automated system were tricked into opening a specially crafted MOV file, an attacker could execute arbitrary code as the user invoking the program. USN-746-1 provided updated xine-lib packages to fix multiple security vulnerabilities. The security patch to fix CVE-2009-0698 was incomplete. This update corrects the problem. Original advisory details: It was discovered that the 4xm demuxer in xine-lib did not correctly handle a large current_track value in a 4xm file, resulting in an integer overflow. If a user or automated system were tricked into opening a specially crafted 4xm movie file, an attacker could crash xine-lib or possibly execute arbitrary code with the privileges of the user invoking the program
Platform: |
Ubuntu 8.04 |
Ubuntu 6.06 |
Ubuntu 8.10 |