Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2009:319 | First vendor Publication | 2009-12-05 |
Vendor | Mandriva | Last vendor Modification | 2009-12-05 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerabilities have been discovered and corrected in xine-lib: Failure on Ogg files manipulation can lead remote attackers to cause a denial of service by using crafted files (CVE-2008-3231). Failure on manipulation of either MNG or Real or MOD files can lead remote attackers to cause a denial of service by using crafted files (CVE: CVE-2008-5233). Heap-based overflow allows remote attackers to execute arbitrary code by using Quicktime media files holding crafted metadata (CVE-2008-5234). Heap-based overflow allows remote attackers to execute arbitrary code by using either crafted Matroska or Real media files (CVE-2008-5236). Failure on manipulation of either MNG or Quicktime files can lead remote attackers to cause a denial of service by using crafted files (CVE-2008-5237). Multiple heap-based overflow on input plugins (http, net, smb, dvd, dvb, rtsp, rtp, pvr, pnm, file, gnome_vfs, mms) allow attackers to execute arbitrary code by handling that input channels. Further this problem can even lead attackers to cause denial of service (CVE-2008-5239). Heap-based overflow allows attackers to execute arbitrary code by using crafted Matroska media files (MATROSKA_ID_TR_CODECPRIVATE track entry element). Further a failure on handling of Real media files (CONT_TAG header) can lead to a denial of service attack (CVE-2008-5240). Integer underflow allows remote attackers to cause denial of service by using Quicktime media files (CVE-2008-5241). Failure on manipulation of Real media files can lead remote attackers to cause a denial of service by indexing an allocated buffer with a certain input value in a crafted file (CVE-2008-5243). Vulnerabilities of unknown impact - possibly buffer overflow - caused by a condition of video frame preallocation before ascertaining the required length in V4L video input plugin (CVE-2008-5245). Heap-based overflow allows remote attackers to execute arbitrary code by using crafted media files. This vulnerability is in the manipulation of ID3 audio file data tagging mainly used in MP3 file formats (CVE-2008-5246). Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow (CVE-2009-1274) Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib 1.1.16.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a 4X movie file with a large current_track value, a similar issue to CVE-2009-0385 (CVE-2009-0698) Packages for 2008.0 are being provided due to extended support for Corporate products. This update fixes these issues. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2009:319 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
62 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
23 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
15 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13445 | |||
Oval ID: | oval:org.mitre.oval:def:13445 | ||
Title: | USN-763-1 -- xine-lib vulnerabilities | ||
Description: | It was discovered that the QT demuxer in xine-lib did not correctly handle a large count value in an STTS atom, resulting in a heap-based buffer overflow. If a user or automated system were tricked into opening a specially crafted MOV file, an attacker could execute arbitrary code as the user invoking the program. USN-746-1 provided updated xine-lib packages to fix multiple security vulnerabilities. The security patch to fix CVE-2009-0698 was incomplete. This update corrects the problem. Original advisory details: It was discovered that the 4xm demuxer in xine-lib did not correctly handle a large current_track value in a 4xm file, resulting in an integer overflow. If a user or automated system were tricked into opening a specially crafted 4xm movie file, an attacker could crash xine-lib or possibly execute arbitrary code with the privileges of the user invoking the program | ||
Family: | unix | Class: | patch |
Reference(s): | USN-763-1 CVE-2009-1274 CVE-2009-0698 | Version: | 5 |
Platform(s): | Ubuntu 8.04 Ubuntu 6.06 Ubuntu 8.10 | Product(s): | xine-lib |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13748 | |||
Oval ID: | oval:org.mitre.oval:def:13748 | ||
Title: | USN-746-1 -- xine-lib vulnerability | ||
Description: | It was discovered that the 4xm demuxer in xine-lib did not correctly handle a large current_track value in a 4xm file, resulting in an integer overflow. If a user or automated system were tricked into opening a specially crafted 4xm movie file, an attacker could crash xine-lib or possibly execute arbitrary code with the privileges of the user invoking the program. USN-710-1 provided updated xine-lib packages to fix multiple security vulnerabilities. The security patch to fix CVE-2008-5239 introduced a regression causing some media files to be unplayable. This update corrects the problem. We apologize for the inconvenience. Original advisory details: It was discovered that the input handlers in xine-lib did not correctly handle certain error codes, resulting in out-of-bounds reads and heap- based buffer overflows. If a user or automated system were tricked into opening a specially crafted file, stream, or URL, an attacker could execute arbitrary code as the user invoking the program | ||
Family: | unix | Class: | patch |
Reference(s): | USN-746-1 CVE-2009-0698 CVE-2008-5239 | Version: | 5 |
Platform(s): | Ubuntu 7.10 Ubuntu 8.04 Ubuntu 6.06 Ubuntu 8.10 | Product(s): | xine-lib |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-03-09 | Name : Gentoo Security Advisory GLSA 201006-04 (xine-lib) File : nvt/glsa_201006_04.nasl |
2009-12-10 | Name : Mandriva Security Advisory MDVSA-2009:319 (xine-lib) File : nvt/mdksa_2009_319.nasl |
2009-12-10 | Name : Mandriva Security Advisory MDVSA-2009:297-1 (ffmpeg) File : nvt/mdksa_2009_297_1.nasl |
2009-11-17 | Name : Mandriva Security Advisory MDVSA-2009:299 (xine-lib) File : nvt/mdksa_2009_299.nasl |
2009-11-17 | Name : Mandriva Security Advisory MDVSA-2009:298 (xine-lib) File : nvt/mdksa_2009_298.nasl |
2009-11-17 | Name : Mandriva Security Advisory MDVSA-2009:297 (ffmpeg) File : nvt/mdksa_2009_297.nasl |
2009-06-15 | Name : SuSE Security Summary SUSE-SR:2009:011 File : nvt/suse_sr_2009_011.nasl |
2009-06-05 | Name : Ubuntu USN-763-1 (xine-lib) File : nvt/ubuntu_763_1.nasl |
2009-06-05 | Name : Ubuntu USN-744-1 (lcms) File : nvt/ubuntu_744_1.nasl |
2009-06-05 | Name : Ubuntu USN-743-1 (gs-gpl) File : nvt/ubuntu_743_1.nasl |
2009-05-20 | Name : FreeBSD Ports: libxine File : nvt/freebsd_libxine11.nasl |
2009-05-20 | Name : FreeBSD Ports: libxine File : nvt/freebsd_libxine12.nasl |
2009-05-05 | Name : Debian Security Advisory DSA 1781-1 (ffmpeg-debian) File : nvt/deb_1781_1.nasl |
2009-05-05 | Name : Debian Security Advisory DSA 1782-1 (mplayer) File : nvt/deb_1782_1.nasl |
2009-04-28 | Name : SuSE Security Summary SUSE-SR:2009:009 File : nvt/suse_sr_2009_009.nasl |
2009-04-15 | Name : Fedora Core 10 FEDORA-2009-3433 (xine-lib) File : nvt/fcore_2009_3433.nasl |
2009-04-15 | Name : Fedora Core 9 FEDORA-2009-3428 (xine-lib) File : nvt/fcore_2009_3428.nasl |
2009-04-06 | Name : Ubuntu USN-746-1 (xine-lib) File : nvt/ubuntu_746_1.nasl |
2009-03-31 | Name : Gentoo Security Advisory GLSA 200903-33 (ffmpeg gst-plugins-ffmpeg mplayer) File : nvt/glsa_200903_33.nasl |
2009-03-20 | Name : FreeBSD Ports: ffmpeg File : nvt/freebsd_ffmpeg0.nasl |
2009-03-20 | Name : Ubuntu USN-734-1 (ffmpeg-debian) File : nvt/ubuntu_734_1.nasl |
2009-02-18 | Name : SuSE Security Summary SUSE-SR:2009:004 File : nvt/suse_sr_2009_004.nasl |
2009-02-17 | Name : Fedora Update for xine-lib FEDORA-2008-7572 File : nvt/gb_fedora_2008_7572_xine-lib_fc8.nasl |
2009-02-17 | Name : Fedora Update for xine-lib FEDORA-2008-7512 File : nvt/gb_fedora_2008_7512_xine-lib_fc9.nasl |
2009-02-13 | Name : Fedora Core 9 FEDORA-2009-1524 (xine-lib) File : nvt/fcore_2009_1524.nasl |
2009-02-13 | Name : Fedora Core 10 FEDORA-2009-1525 (xine-lib) File : nvt/fcore_2009_1525.nasl |
2009-02-02 | Name : Ubuntu USN-710-1 (xine-lib) File : nvt/ubuntu_710_1.nasl |
2009-01-26 | Name : Mandrake Security Advisory MDVSA-2009:020 (xine-lib) File : nvt/mdksa_2009_020.nasl |
2009-01-20 | Name : Fedora Core 9 FEDORA-2009-0542 (xine-lib) File : nvt/fcore_2009_0542.nasl |
2009-01-20 | Name : Fedora Core 10 FEDORA-2009-0483 (xine-lib) File : nvt/fcore_2009_0483.nasl |
2008-11-01 | Name : FreeBSD Ports: libxine File : nvt/freebsd_libxine10.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2009-098-03 xine-lib File : nvt/esoft_slk_ssa_2009_098_03.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
53288 | xine-lib STTS Quicktime Atom Handling Remote Overflow |
52943 | xine-lib demux_real.c real_parse_audio_specific_data Function Media File Hand... |
52942 | xine-lib demux_mod.c open_mod_file Function Media File Handling Arbitrary Cod... |
52941 | xine-lib demux_mng.c mymng_process_header Function Media File Handling Arbitr... |
52940 | xine-lib demux_realaudio.c open_ra_file Function RA File Handling Overflow |
52939 | xine-lib demux_real.c Multiple Function Overflows |
52938 | xine-lib demux_matroska.c parse_block_group Function EBML Element Length Proc... |
52498 | xine-lib demuxers/demux_4xm.c current_track Value Handling Overflow |
51643 | FFmpeg libavformat/4xm.c fourxm_read_header Function 4xm File Handling Memory... |
50910 | xine-lib demux_real.c real_parse_headers Function Multiple Chunk Processing R... |
50909 | xine-lib demux_matroska.c MATROSKA_ID_TR_CODECPRIVATE Track Entry Element Han... |
47751 | xine-lib input_http.c Input Plugins Unspecified Read Function Call Overflow |
47750 | xine-lib input_smb.c Input Plugins Unspecified Read Function Call Overflow |
47749 | xine-lib input_net.c Input Plugins Unspecified Read Function Call Overflow |
47748 | xine-lib input_file.c Input Plugins Unspecified Read Function Call Overflow |
47746 | xine-lib src/demuxers/demux_mng.c mymng_process_header() Function Overflow |
47745 | xine-lib src/demuxers/id3.c id3v*_interp_frame() Function Overflow |
47743 | xine-lib src/demuxers/demux_real.c Multiple Function Overflows Multiple overflows exists in xine-lib. The Real demuxer (src/demuxers/demux_real.c) fails to properly sanitize input to the real_parse_audio_specific_data(), real_parse_mdpr() and real_parse_headers() functions resulting in an overflow. With a specially crafted file or request, an attacker can cause the execution of arbitrary code or force process termination. |
47741 | xine-lib src/demuxers/demux_qt.c Multiple Overflows Multiple overflows exists in xine-lib. The QT demuxer (src/demuxers/demux_qt.c) fails to properly sanitize input to the parse_moov_atom() function, parse_reference_atom() function, when handling compressed MOV (CMOV_ATOM) files and when allocating STSD_ATOM atoms resulting in an overflow. With a specially crafted file or request, an attacker can cause the execution of arbitrary code or force process termination. |
47679 | xine-lib src/input/input_v4l.c open_video_capture_device() Function V4L Strea... |
47158 | Xine / xine-lib Crafted OGG File Handling DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | FFmpeg 4xm processing memory corruption attempt RuleID : 15871 - Revision : 12 - Type : FILE-MULTIMEDIA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xine-devel-6229.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xine-devel-6050.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xine-devel-5965.nasl - Type : ACT_GATHER_INFO |
2010-06-02 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201006-04.nasl - Type : ACT_GATHER_INFO |
2009-12-07 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-319.nasl - Type : ACT_GATHER_INFO |
2009-11-16 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-297.nasl - Type : ACT_GATHER_INFO |
2009-11-16 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-299.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_libxine1-090507.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libxine-devel-090318.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_xine-devel-090507.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_libxine-devel-090309.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_xine-devel-090129.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_libxine-devel-090309.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_libxine1-090507.nasl - Type : ACT_GATHER_INFO |
2009-05-20 | Name : The remote openSUSE host is missing a security update. File : suse_xine-devel-6230.nasl - Type : ACT_GATHER_INFO |
2009-05-18 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_48e14d8642f111dead22000e35248ad7.nasl - Type : ACT_GATHER_INFO |
2009-05-18 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_51d1d42842f011dead22000e35248ad7.nasl - Type : ACT_GATHER_INFO |
2009-04-30 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1781.nasl - Type : ACT_GATHER_INFO |
2009-04-30 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1782.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-763-1.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-746-1.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-734-1.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2009-3433.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-710-1.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2009-1525.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-020.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2009-0483.nasl - Type : ACT_GATHER_INFO |
2009-04-21 | Name : The remote openSUSE host is missing a security update. File : suse_libxine-devel-6052.nasl - Type : ACT_GATHER_INFO |
2009-04-10 | Name : The remote Fedora host is missing a security update. File : fedora_2009-3428.nasl - Type : ACT_GATHER_INFO |
2009-04-08 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2009-098-03.nasl - Type : ACT_GATHER_INFO |
2009-03-20 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200903-33.nasl - Type : ACT_GATHER_INFO |
2009-03-17 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_6733e1bf125f11dea9640030843d3802.nasl - Type : ACT_GATHER_INFO |
2009-02-13 | Name : The remote Fedora host is missing a security update. File : fedora_2009-1524.nasl - Type : ACT_GATHER_INFO |
2009-02-05 | Name : The remote openSUSE host is missing a security update. File : suse_xine-devel-5966.nasl - Type : ACT_GATHER_INFO |
2009-01-16 | Name : The remote Fedora host is missing a security update. File : fedora_2009-0542.nasl - Type : ACT_GATHER_INFO |
2008-10-20 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_06eac3389ddf11dd813f000e35248ad7.nasl - Type : ACT_GATHER_INFO |
2008-09-10 | Name : The remote Fedora host is missing a security update. File : fedora_2008-7572.nasl - Type : ACT_GATHER_INFO |
2008-09-10 | Name : The remote Fedora host is missing a security update. File : fedora_2008-7512.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:41:03 |
|