Gentoo Logo

Xvid: Array indexing vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200708-02 / xvid
Release Date August 08, 2007
Latest Revision August 08, 2007: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-libs/xvid < 1.1.3 >= 1.1.3 All supported architectures

Related bugreports: #183145

Synopsis

Several array indexing vulnerabilities were discovered in Xvid, possibly allowing for the remote execution of arbitrary code.

2.  Impact Information

Background

Xvid is a popular open source video codec licensed under the GPL.

Description

Trixter Jack discovered an array indexing error in the get_intra_block() function in the file src/bitstream/mbcoding.c. The get_inter_block_h263() and get_inter_block_mpeg() functions in the same file were also reported as vulnerable.

Impact

An attacker could exploit these vulnerabilities to execute arbitrary code by tricking a user or automated system into processing a malicious video file with an application that makes use of the Xvid library.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All Xvid users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/xvid-1.1.3"

4.  References



Print

Page updated August 08, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.