blob: 107af43217b49b917522fbde7a75818dbd334cf2 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200604-16">
<title>xine-lib: Buffer overflow vulnerability</title>
xine-lib contains a buffer overflow vulnerability which may lead to the
execution of arbitrary code.
<product type="ebuild">xine-lib</product>
<announced>April 26, 2006</announced>
<revised>April 26, 2006: 01</revised>
<package name="media-libs/xine-lib" auto="yes" arch="*">
<unaffected range="ge">1.1.2_pre20060328-r1</unaffected>
<vulnerable range="lt">1.1.2_pre20060328-r1</vulnerable>
xine-lib is the xine core engine. xine is a free multimedia
player. It plays CDs, DVDs, and VCDs, and can also decode other common
multimedia formats.
Federico L. Bossi Bonin discovered that when handling MPEG streams
xine-lib fails to make a proper boundary check of the input data
supplied by the user before copying it to an insufficiently sized
memory buffer.
<impact type="normal">
A remote attacker could entice a user to play a specially-crafted
MPEG file, resulting in the execution of arbitrary code with the
permissions of the user running the application.
There is no known workaround at this time.
All xine-lib users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xine-lib-1.1.2_pre20060328-r1&quot;</code>
<uri link="">CVE-2006-1664</uri>
<metadata tag="requester" timestamp="Fri, 21 Apr 2006 20:35:23 +0000">
<metadata tag="submitter" timestamp="Sun, 23 Apr 2006 00:46:13 +0000">
<metadata tag="bugReady" timestamp="Mon, 24 Apr 2006 16:31:50 +0000">