![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.60252 |
Category: | Mandrake Local Security Checks |
Title: | Mandrake Security Advisory MDVSA-2008:020 (xine-lib) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to xine-lib announced via advisory MDVSA-2008:020. Two vulnerabilities discovered in xine-lib allow remote execution of arbitrary code: Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute, related to the rmff_dump_header function and related to disregarding the max field. (CVE-2008-0225) Multiple heap-based buffer overflows in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to execute arbitrary code via the SDP (1) Title, (2) Author, or (3) Copyright attribute, related to the rmff_dump_header function, different vectors than CVE-2008-0225. (CVE-2008-0238) Besides those security issues, the xine-lib provided in Mandriva Linux 2008.0 and 2007.1 did not automatically use Real binary codecs, when the user had them installed in /usr/lib64/real on x86_64 architecture. Also, xine-lib of Mandriva Linux 2007.1 did not automatically use the Real codecs from /usr/lib/RealPlayer10GOLD/codecs, which is provided by RealPlayer package of Mandriva Powerpack editions. The updated packages fix these issues. Affected: 2007.1, 2008.0, Corporate 3.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2008:020 http://qa.mandriva.com/show_bug.cgi?id=36353 Risk factor : Critical CVSS Score: 10.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-0225 BugTraq ID: 27198 http://www.securityfocus.com/bid/27198 Debian Security Information: DSA-1472 (Google Search) http://www.debian.org/security/2008/dsa-1472 https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00592.html http://security.gentoo.org/glsa/glsa-200801-12.xml http://www.mandriva.com/security/advisories?name=MDVSA-2008:020 http://www.mandriva.com/security/advisories?name=MDVSA-2008:045 http://aluigi.altervista.org/adv/xinermffhof-adv.txt http://secunia.com/advisories/28384 http://secunia.com/advisories/28489 http://secunia.com/advisories/28507 http://secunia.com/advisories/28636 http://secunia.com/advisories/28674 http://secunia.com/advisories/28955 http://secunia.com/advisories/31393 SuSE Security Announcement: SUSE-SR:2008:002 (Google Search) http://www.novell.com/linux/security/advisories/suse_security_summary_report.html http://www.ubuntu.com/usn/usn-635-1 http://www.vupen.com/english/advisories/2008/0163 Common Vulnerability Exposure (CVE) ID: CVE-2008-0238 Common Vulnerability Exposure (CVE) ID: CVE-2008-0235 BugTraq ID: 27199 http://www.securityfocus.com/bid/27199 https://www.exploit-db.com/exploits/4875 http://packetstormsecurity.org/0801-exploits/msvfpole-exec.txt http://shinnai.altervista.org/exploits/txt/TXT_rNowA1916DKFNUF48NyS.html http://secunia.com/advisories/28417 XForce ISS Database: microsoft-vfpoleserver-command-execution(39559) https://exchange.xforce.ibmcloud.com/vulnerabilities/39559 |
Copyright | Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |