copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AA-2008.0008 -- [UNIX/Linux] -- Buffer overflow vulnerability in xine-lib

Date: 14 January 2008
References: ESB-2008.0078  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
AA-2008.0008                  AUSCERT Advisory

                               [UNIX/Linux]
                 Buffer overflow vulnerability in xine-lib
                              14 January 2008
- ---------------------------------------------------------------------------

        AusCERT Advisory Summary
        ------------------------

Product:              xine-lib
Operating System:     UNIX variants (UNIX, Linux, OSX)
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-0225
Member content until: Monday, February 11 2008

OVERVIEW:

       A buffer overflow vulnerability has been reported in xine 1.1.9 and
       earlier that allows a remote attacker to execute arbitrary code.


IMPACT:

       The National Vulnerability Database [1], gives the following
       information regarding this vulnerability:

       o CVE-2008-0025: "Heap-based buffer overflow in the rmff_dump_cont 
         function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier 
         allows remote attackers to execute arbitrary code via the SDP 
         Abstract attribute, related to the rmff_dump_header function and 
         related to disregarding the max field. NOTE: some of these details 
         are obtained from third party information." [2]


MITIGATION:

        A new version of xine-lib is now available for download from the
        xine website. [3]


REFERENCES:

        [1] National Vulnerability Database
            http://nvd.nist.gov/

        [2] National Vulnerability Database (CVE-2008-0025)
            http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0025

        [3] xine - A Free Video Player - Download
            http://xinehq.de/index.php/download

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR4r1hSh9+71yA2DNAQKdNAP9ENZF3yDxNwiRurzP/TNfPccGQm9ZDKoo
q65mG8PVIICVqSfYq4xrk+RJubf88vE8X1asIx2oh2jLs8V0f5mk8DdhJW7rmfu8
WGGX/l0Gj2mFsJ9/AT//VT/JqH1dioE1HncNr99Es9AFpcVtMpcDuWg795LieGrz
IwvHFLypBtI=
=qEYC
-----END PGP SIGNATURE-----