xine-lib: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200409-30 / xine-lib
||September 22, 2004
||May 22, 2006: 02
All supported architectures
xine-lib contains several vulnerabilities potentially allowing the
execution of arbitrary code.
xine-lib is a multimedia library which can be utilized to create
xine-lib contains two stack-based overflows and one heap-based
overflow. In the code reading VCD disc labels, the ISO disc label is
copied into an unprotected stack buffer of fixed size. Also, there is a
buffer overflow in the code that parses subtitles and prepares them for
display (XSA-2004-4). Finally, xine-lib contains a heap-based overflow
in the DVD sub-picture decoder (XSA-2004-5).
(Please note that the VCD MRL issue mentioned in XSA-2004-4 was fixed
with GLSA 200408-18.)
With carefully-crafted VCDs, DVDs, MPEGs or subtitles, an attacker may
cause xine-lib to execute arbitrary code with the permissions of the
There is no known workaround at this time.
All xine-lib users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge sync
# emerge -pv ">=media-libs/xine-lib-1_rc6"
# emerge ">=media-libs/xine-lib-1_rc6"