blob: 4e7c18dd3cde14a68b130b6bf19a836cccffa1ca [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200812-24">
<title>VLC: Multiple vulnerabilities</title>
Multiple vulnerabilities in VLC may lead to the remote execution of
arbitrary code.
<product type="ebuild">vlc</product>
<announced>December 24, 2008</announced>
<revised>December 24, 2008: 01</revised>
<package name="media-video/vlc" auto="yes" arch="*">
<unaffected range="ge">0.9.8a</unaffected>
<vulnerable range="lt">0.9.8a</vulnerable>
VLC is a cross-platform media player and streaming server.
Tobias Klein reported the following vulnerabilities:
stack-based buffer overflow when processing CUE image files in
modules/access/vcd/cdrom.c (CVE-2008-5032).</li>
<li>A stack-based
buffer overflow when processing RealText (.rt) subtitle files in the
ParseRealText() function in modules/demux/subtitle.c
<li>An integer overflow when processing RealMedia
(.rm) files in the ReadRealIndex() function in real.c in the Real
demuxer plugin, leading to a heap-based buffer overflow
<impact type="normal">
A remote attacker could entice a user to open a specially crafted CUE
image file, RealMedia file or RealText subtitle file, possibly
resulting in the execution of arbitrary code with the privileges of the
user running the application.
There is no known workaround at this time.
All VLC users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-video/vlc-0.9.8a&quot;</code>
<uri link="">CVE-2008-5032</uri>
<uri link="">CVE-2008-5036</uri>
<uri link="">CVE-2008-5276</uri>
<metadata tag="requester" timestamp="Mon, 15 Dec 2008 14:05:23 +0000">
<metadata tag="submitter" timestamp="Sun, 21 Dec 2008 19:55:55 +0000">
<metadata tag="bugReady" timestamp="Sun, 21 Dec 2008 20:12:40 +0000">