Gentoo Logo

xine-lib: Buffer overflow

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200607-07 / xine-lib
Release Date July 20, 2006
Latest Revision July 20, 2006: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-libs/xine-lib < 1.1.2-r2 >= 1.1.2-r2 All supported architectures

Related bugreports: #139319

Synopsis

A buffer overflow has been found in the libmms library shipped with xine-lib, potentially resulting in the execution of arbitrary code.

2.  Impact Information

Background

xine-lib is the core library of xine, a multimedia player.

Description

There is a stack based overflow in the libmms library included with xine-lib which can be triggered by malicious use of the send_command, string_utf16, get_data and get_media_packet functions.

Impact

A remote attacker could design a malicious media file that would trigger the overflow, potentially resulting in the execution of arbitrary code.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All xine-lib users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r2"

4.  References



Print

Page updated July 20, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.