xine-lib: Buffer overflow vulnerability
Gentoo Linux Security Advisory
||GLSA 200604-16 / xine-lib
||April 26, 2006
||April 26, 2006: 01
All supported architectures
xine-lib contains a buffer overflow vulnerability which may lead to the
execution of arbitrary code.
xine-lib is the xine core engine. xine is a free multimedia
player. It plays CDs, DVDs, and VCDs, and can also decode other common
Federico L. Bossi Bonin discovered that when handling MPEG streams
xine-lib fails to make a proper boundary check of the input data
supplied by the user before copying it to an insufficiently sized
A remote attacker could entice a user to play a specially-crafted
MPEG file, resulting in the execution of arbitrary code with the
permissions of the user running the application.
There is no known workaround at this time.
All xine-lib users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2_pre20060328-r1"