Bug 428621 (CVE-2008-0238)

Summary: CVE-2008-0238 xine-lib: SDP attributes buffer overflow
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: extras-orphan, gauret, rdieter, ville.skytta
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0238
Whiteboard:
Fixed In Version: 1.1.9.1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-01-26 22:45:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Tomas Hoger 2008-01-14 08:21:56 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-0238 to the following vulnerability:

Multiple heap-based buffer overflows in the rmff_dump_cont function in
input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to
execute arbitrary code via the SDP (1) Title, (2) Author, or (3)
Copyright attribute, related to the rmff_dump_header function,
different vectors than CVE-2008-0225. NOTE: the provenance of this
information is unknown; the details are obtained solely from third
party information.

References:
http://secunia.com/advisories/28384

Comment 1 Tomas Hoger 2008-01-14 08:45:05 UTC
Upstream fix in 1.1.9.1 seems to address these additional vectors too.  xine-lib
maintainers, what do you think?

Comment 2 Ville Skyttä 2008-01-26 22:45:22 UTC
Upstream confirms that this is fixed in 1.1.9.1:
http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=461fae9b8fca;style=gitweb