LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 24th, 2014
Linux Security Week: October 20th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: [ MDVSA-2009:020 ] xine-lib Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Failure on Ogg files manipulation can lead remote attackers to cause a denial of service by using crafted files (CVE-2008-3231).... This update provides the fix for all these security issues found in xine-lib 1.1.11 of Mandriva 2008.1. The vulnerabilities: CVE-2008-5234, CVE-2008-5236, CVE-2008-5237, CVE-2008-5239, CVE-2008-5240, CVE-2008-5243 are found in xine-lib 1.1.15 of Mandriva 2009.0 and are also fixed by this update.
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:020
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : xine-lib
 Date    : January 21, 2009
 Affected: 2008.1, 2009.0
 _______________________________________________________________________

 Problem Description:

 Failure on Ogg files manipulation can lead remote attackers to cause
 a denial of service by using crafted files (CVE-2008-3231).
 
 Failure on manipulation of either MNG or Real or MOD files can lead
 remote attackers to cause a denial of service by using crafted files
 (CVE: CVE-2008-5233).
 
 Heap-based overflow allows remote attackers to execute arbitrary
 code by using Quicktime media files holding crafted metadata
 (CVE-2008-5234).
 
 Heap-based overflow allows remote attackers to execute arbitrary code
 by using either crafted Matroska or Real media files (CVE-2008-5236).
 
 Failure on manipulation of either MNG or Quicktime files can lead
 remote attackers to cause a denial of service by using crafted files
 (CVE-2008-5237).
 
 Multiple heap-based overflow on input plugins (http, net, smb, dvd,
 dvb, rtsp, rtp, pvr, pnm, file, gnome_vfs, mms) allow attackers to
 execute arbitrary code by handling that input channels. Further
 this problem can even lead attackers to cause denial of service
 (CVE-2008-5239).
 
 Heap-based overflow allows attackers to execute arbitrary code by using
 crafted Matroska media files (MATROSKA_ID_TR_CODECPRIVATE track entry
 element). Further a failure on handling of Real media files (CONT_TAG
 header) can lead to a denial of service attack (CVE-2008-5240).
 
 Integer underflow allows remote attackers to cause denial of service
 by using Quicktime media files (CVE-2008-5241).
 
 Failure on manipulation of Real media files can lead remote attackers
 to cause a denial of service by indexing an allocated buffer with a
 certain input value in a crafted file (CVE-2008-5243).
 
 Vulnerabilities of unknown impact - possibly buffer overflow - caused
 by a condition of video frame preallocation before ascertaining the
 required length in V4L video input plugin (CVE-2008-5245).
 
 Heap-based overflow allows remote attackers to execute arbitrary
 code by using crafted media files. This vulnerability is in the
 manipulation of ID3 audio file data tagging mainly used in MP3 file
 formats (CVE-2008-5246).
 
 This update provides the fix for all these security issues found in
 xine-lib 1.1.11 of Mandriva 2008.1. The vulnerabilities: CVE-2008-5234,
 CVE-2008-5236, CVE-2008-5237, CVE-2008-5239, CVE-2008-5240,
 CVE-2008-5243 are found in xine-lib 1.1.15 of Mandriva 2009.0 and
 are also fixed by this update.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3231
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5233
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5234
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5236
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5237
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5240
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5241
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5243
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5245
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5246
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 e20605c83b2194ac4efa7d9094e26c56  2008.1/i586/libxine1-1.1.11.1-4.3mdv2008.1.i586.rpm
 2796213cebb765a137ea4b480251d0fc  2008.1/i586/libxine-devel-1.1.11.1-4.3mdv2008.1.i586.rpm
 7dda1f87f8e1e5b3b4a3731ef584d29f  2008.1/i586/xine-aa-1.1.11.1-4.3mdv2008.1.i586.rpm
 f081327bdbef86684ca1a156016d0077  2008.1/i586/xine-caca-1.1.11.1-4.3mdv2008.1.i586.rpm
 d190077b5400b3953ba31e18d8cb7626  2008.1/i586/xine-dxr3-1.1.11.1-4.3mdv2008.1.i586.rpm
 c2ffab2f96ce10b2561644695736bd78  2008.1/i586/xine-esd-1.1.11.1-4.3mdv2008.1.i586.rpm
 98954f07029734d6153c420e47ab569e  2008.1/i586/xine-flac-1.1.11.1-4.3mdv2008.1.i586.rpm
 206af31937afa63ada749249274ef290  2008.1/i586/xine-gnomevfs-1.1.11.1-4.3mdv2008.1.i586.rpm
 95077f02a8db4b588bad2fe7618579a0  2008.1/i586/xine-image-1.1.11.1-4.3mdv2008.1.i586.rpm
 98385b3fde836bb431005e5ec2d15d16  2008.1/i586/xine-jack-1.1.11.1-4.3mdv2008.1.i586.rpm
 27c796dfb2864bf261751cb94188ef0a  2008.1/i586/xine-plugins-1.1.11.1-4.3mdv2008.1.i586.rpm
 d7662beac2f687631211cc5f21a5fd01  2008.1/i586/xine-pulse-1.1.11.1-4.3mdv2008.1.i586.rpm
 7b623605925e3c9420f1ab8ad0305746  2008.1/i586/xine-sdl-1.1.11.1-4.3mdv2008.1.i586.rpm
 0f26da9d1f12e487fbbbd32d747baf04  2008.1/i586/xine-smb-1.1.11.1-4.3mdv2008.1.i586.rpm
 7109113566ede12eb553eb747b1894cf  2008.1/i586/xine-wavpack-1.1.11.1-4.3mdv2008.1.i586.rpm 
 7752e252488c7a11f6413aebba0538cb  2008.1/SRPMS/xine-lib-1.1.11.1-4.3mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 15eea220c231423c89aa0d3eb46bb26a  2008.1/x86_64/lib64xine1-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 db70d556a8e4190d4409a5c6b427014a  2008.1/x86_64/lib64xine-devel-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 e943aab8d6eb09aff4b619622c9783d1  2008.1/x86_64/xine-aa-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 327a3a028c63b20cab46baf8f5a7df92  2008.1/x86_64/xine-caca-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 ff48b0d2489bd34325652c0c109f6314  2008.1/x86_64/xine-dxr3-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 f842824c9a99809c74307a554057d8db  2008.1/x86_64/xine-esd-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 0fc11ffd9685459408d805ef3f4fd2c3  2008.1/x86_64/xine-flac-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 fb1e93406dbca711b6dc0b835ebf7be9  2008.1/x86_64/xine-gnomevfs-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 874da5b0797d8f7c1512bfc2b2e76d70  2008.1/x86_64/xine-image-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 5c6995998270809c69da455fa66453fd  2008.1/x86_64/xine-jack-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 e65b816e24b3f4f567065746f743483e  2008.1/x86_64/xine-plugins-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 45efd1b9e8951fb4d1c8a36aff223b00  2008.1/x86_64/xine-pulse-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 dde467ef740dce9cc5d4d848e2033e99  2008.1/x86_64/xine-sdl-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 60a7538c61a65939300e0b62799f6670  2008.1/x86_64/xine-smb-1.1.11.1-4.3mdv2008.1.x86_64.rpm
 8299bd25bf4210bf581d388c3851c8fd  2008.1/x86_64/xine-wavpack-1.1.11.1-4.3mdv2008.1.x86_64.rpm 
 7752e252488c7a11f6413aebba0538cb  2008.1/SRPMS/xine-lib-1.1.11.1-4.3mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 db86806b346a19af18f22f3e793bd266  2009.0/i586/libxine1-1.1.15-2.1mdv2009.0.i586.rpm
 32a824de7dee97737a54219faf4da864  2009.0/i586/libxine-devel-1.1.15-2.1mdv2009.0.i586.rpm
 febbff4f16305d786b76d797afbd76c3  2009.0/i586/xine-aa-1.1.15-2.1mdv2009.0.i586.rpm
 479b9612afa9f981677014875d626af4  2009.0/i586/xine-caca-1.1.15-2.1mdv2009.0.i586.rpm
 55a5e88f7d3ac02951ef755989312359  2009.0/i586/xine-dxr3-1.1.15-2.1mdv2009.0.i586.rpm
 42d4d32463d1470910561111d0351e57  2009.0/i586/xine-esd-1.1.15-2.1mdv2009.0.i586.rpm
 fe3d00919b4eeba7020c591ef95fb31c  2009.0/i586/xine-flac-1.1.15-2.1mdv2009.0.i586.rpm
 c27cfc577dcffb08a8fe9ba1543d4bd7  2009.0/i586/xine-gnomevfs-1.1.15-2.1mdv2009.0.i586.rpm
 e072ee51827f291907e63f23c2f4e8ee  2009.0/i586/xine-image-1.1.15-2.1mdv2009.0.i586.rpm
 228c3559ac7e406908202d53b3a5b3db  2009.0/i586/xine-jack-1.1.15-2.1mdv2009.0.i586.rpm
 138f5fc047b0afd005fecdc3a975d809  2009.0/i586/xine-plugins-1.1.15-2.1mdv2009.0.i586.rpm
 f76e99f5c99c636d470f69307fdcf4d3  2009.0/i586/xine-pulse-1.1.15-2.1mdv2009.0.i586.rpm
 43b4744691ca05b20e3316c990b8037c  2009.0/i586/xine-sdl-1.1.15-2.1mdv2009.0.i586.rpm
 1fff1967ca97e7bcdbb7d85e764c50b1  2009.0/i586/xine-smb-1.1.15-2.1mdv2009.0.i586.rpm
 f318867fd21acd90b9b0e7ff4e3967db  2009.0/i586/xine-wavpack-1.1.15-2.1mdv2009.0.i586.rpm 
 98ca1c95a5cc5aac8ccfd65e4e0bcb5d  2009.0/SRPMS/xine-lib-1.1.15-2.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 3c249d6b95e0147f2c57dad0a086a16b  2009.0/x86_64/lib64xine1-1.1.15-2.1mdv2009.0.x86_64.rpm
 9d963e6af6b09edabb3751b380657153  2009.0/x86_64/lib64xine-devel-1.1.15-2.1mdv2009.0.x86_64.rpm
 d7da52bf129d65fb7116c925b2c75ebe  2009.0/x86_64/xine-aa-1.1.15-2.1mdv2009.0.x86_64.rpm
 8435fc05bc2a84451065368f65c3632f  2009.0/x86_64/xine-caca-1.1.15-2.1mdv2009.0.x86_64.rpm
 944c05fc4d01e4873e3b0a6b8f395940  2009.0/x86_64/xine-dxr3-1.1.15-2.1mdv2009.0.x86_64.rpm
 d19a6444246b111ade7ec188fbb155cc  2009.0/x86_64/xine-esd-1.1.15-2.1mdv2009.0.x86_64.rpm
 472e69a5598ced5e7dd16bb14a715eb4  2009.0/x86_64/xine-flac-1.1.15-2.1mdv2009.0.x86_64.rpm
 718b6f614c319809c1697193182d84ec  2009.0/x86_64/xine-gnomevfs-1.1.15-2.1mdv2009.0.x86_64.rpm
 eca3159086e7b81a833c6dea02cd9cee  2009.0/x86_64/xine-image-1.1.15-2.1mdv2009.0.x86_64.rpm
 06d9cab15a7f41c8bde4033337b79a44  2009.0/x86_64/xine-jack-1.1.15-2.1mdv2009.0.x86_64.rpm
 d0f6810bdfb1fdcc5537e9162cbb50a6  2009.0/x86_64/xine-plugins-1.1.15-2.1mdv2009.0.x86_64.rpm
 280fe06e59d4636050107b629bbf4c81  2009.0/x86_64/xine-pulse-1.1.15-2.1mdv2009.0.x86_64.rpm
 967d8f5dbe03f147f22937131fc8efbf  2009.0/x86_64/xine-sdl-1.1.15-2.1mdv2009.0.x86_64.rpm
 1e8f29a385319105428a4e1d6304e900  2009.0/x86_64/xine-smb-1.1.15-2.1mdv2009.0.x86_64.rpm
 a51c34a193b95295b3e52259f265a7dd  2009.0/x86_64/xine-wavpack-1.1.15-2.1mdv2009.0.x86_64.rpm 
 98ca1c95a5cc5aac8ccfd65e4e0bcb5d  2009.0/SRPMS/xine-lib-1.1.15-2.1mdv2009.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Disaster as CryptoWall encrypts US firm's entire server installation
Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.