MDVSA-2008:178 -- Mandriva xine-libID: oval:org.secpod.oval:def:301288 | Date: (C)2012-01-07 (M)2023-11-09 |
Class: PATCH | Family: unix |
Alin Rad Pop found an array index vulnerability in the SDP parser of xine-lib. If a user or automated system were tricked into opening a malicious RTSP stream, a remote attacker could possibly execute arbitrary code with the privileges of the user using the program . The ASF demuxer in xine-lib did not properly check the length of ASF headers. If a user was tricked into opening a crafted ASF file, a remote attacker could possibly cause a denial of service or execute arbitrary code with the privileges of the user using the program . The Matroska demuxer in xine-lib did not properly verify frame sizes, which could possibly lead to the execution of arbitrary code if a user opened a crafted ASF file . Luigi Auriemma found multiple integer overflows in xine-lib. If a user was tricked into opening a crafted FLV, MOV, RM, MVE, MKV, or CAK file, a remote attacker could possibly execute arbitrary code with the privileges of the user using the program . Guido Landi found A stack-based buffer overflow in xine-lib that could allow a remote attacker to cause a denial of service and potentially execute arbitrary code via a long NSF title . The updated packages have been patched to correct this issue.
Platform: |
Mandriva Linux 2008.0 |