Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200612-02 ] xine-lib: Buffer overflow
Date: Sat, 09 Dec 2006 08:16:39
Message-Id: 200612090845.22690.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200612-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: xine-lib: Buffer overflow
9 Date: December 09, 2006
10 Bugs: #156645
11 ID: 200612-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 xine-lib is vulnerable to a buffer overflow in the Real Media input
19 plugin, which could lead to the execution of arbitrary code.
20
21 Background
22 ==========
23
24 xine is a portable and reusable multimedia playback engine. xine-lib is
25 xine's core engine.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 media-libs/xine-lib < 1.1.2-r3 >= 1.1.2-r3
34
35 Description
36 ===========
37
38 A possible buffer overflow has been reported in the Real Media input
39 plugin.
40
41 Impact
42 ======
43
44 An attacker could exploit this vulnerability by enticing a user into
45 loading a specially crafted stream with xine or an application using
46 xine-lib. This can lead to a Denial of Service and possibly the
47 execution of arbitrary code with the rights of the user running the
48 application.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All xine-lib users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r3"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2006-6172
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6172
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 http://security.gentoo.org/glsa/glsa-200612-02.xml
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 http://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2006 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.5