Gentoo Logo

Xvid: Array indexing vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200708-02 / xvid
Release Date August 08, 2007
Latest Revision August 08, 2007: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-libs/xvid < 1.1.3 >= 1.1.3 All supported architectures

Related bugreports: #183145


Several array indexing vulnerabilities were discovered in Xvid, possibly allowing for the remote execution of arbitrary code.

2.  Impact Information


Xvid is a popular open source video codec licensed under the GPL.


Trixter Jack discovered an array indexing error in the get_intra_block() function in the file src/bitstream/mbcoding.c. The get_inter_block_h263() and get_inter_block_mpeg() functions in the same file were also reported as vulnerable.


An attacker could exploit these vulnerabilities to execute arbitrary code by tricking a user or automated system into processing a malicious video file with an application that makes use of the Xvid library.

3.  Resolution Information


There is no known workaround at this time.


All Xvid users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/xvid-1.1.3"

4.  References


Page updated August 08, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.