Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.60252
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDVSA-2008:020 (xine-lib)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to xine-lib
announced via advisory MDVSA-2008:020.

Two vulnerabilities discovered in xine-lib allow remote execution of
arbitrary code:

Heap-based buffer overflow in the rmff_dump_cont function in
input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote
attackers to execute arbitrary code via the SDP Abstract attribute,
related to the rmff_dump_header function and related to disregarding
the max field. (CVE-2008-0225)

Multiple heap-based buffer overflows in the rmff_dump_cont function
in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers
to execute arbitrary code via the SDP (1) Title, (2) Author, or
(3) Copyright attribute, related to the rmff_dump_header function,
different vectors than CVE-2008-0225. (CVE-2008-0238)

Besides those security issues, the xine-lib provided in Mandriva
Linux 2008.0 and 2007.1 did not automatically use Real binary
codecs, when the user had them installed in /usr/lib64/real
on x86_64 architecture. Also, xine-lib of Mandriva Linux
2007.1 did not automatically use the Real codecs from
/usr/lib/RealPlayer10GOLD/codecs, which is provided by RealPlayer
package of Mandriva Powerpack editions.

The updated packages fix these issues.

Affected: 2007.1, 2008.0, Corporate 3.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2008:020
http://qa.mandriva.com/show_bug.cgi?id=36353

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-0225
BugTraq ID: 27198
http://www.securityfocus.com/bid/27198
Debian Security Information: DSA-1472 (Google Search)
http://www.debian.org/security/2008/dsa-1472
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00592.html
http://security.gentoo.org/glsa/glsa-200801-12.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:020
http://www.mandriva.com/security/advisories?name=MDVSA-2008:045
http://aluigi.altervista.org/adv/xinermffhof-adv.txt
http://secunia.com/advisories/28384
http://secunia.com/advisories/28489
http://secunia.com/advisories/28507
http://secunia.com/advisories/28636
http://secunia.com/advisories/28674
http://secunia.com/advisories/28955
http://secunia.com/advisories/31393
SuSE Security Announcement: SUSE-SR:2008:002 (Google Search)
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
http://www.ubuntu.com/usn/usn-635-1
http://www.vupen.com/english/advisories/2008/0163
Common Vulnerability Exposure (CVE) ID: CVE-2008-0238
Common Vulnerability Exposure (CVE) ID: CVE-2008-0235
BugTraq ID: 27199
http://www.securityfocus.com/bid/27199
https://www.exploit-db.com/exploits/4875
http://packetstormsecurity.org/0801-exploits/msvfpole-exec.txt
http://shinnai.altervista.org/exploits/txt/TXT_rNowA1916DKFNUF48NyS.html
http://secunia.com/advisories/28417
XForce ISS Database: microsoft-vfpoleserver-command-execution(39559)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39559
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.