Bug 428621 (CVE-2008-0238) - CVE-2008-0238 xine-lib: SDP attributes buffer overflow
Summary: CVE-2008-0238 xine-lib: SDP attributes buffer overflow
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2008-0238
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-01-14 08:21 UTC by Tomas Hoger
Modified: 2019-09-29 12:22 UTC (History)
4 users (show)

Fixed In Version: 1.1.9.1
Clone Of:
Environment:
Last Closed: 2008-01-26 22:45:22 UTC
Embargoed:


Attachments (Terms of Use)

Description Tomas Hoger 2008-01-14 08:21:56 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-0238 to the following vulnerability:

Multiple heap-based buffer overflows in the rmff_dump_cont function in
input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to
execute arbitrary code via the SDP (1) Title, (2) Author, or (3)
Copyright attribute, related to the rmff_dump_header function,
different vectors than CVE-2008-0225. NOTE: the provenance of this
information is unknown; the details are obtained solely from third
party information.

References:
http://secunia.com/advisories/28384

Comment 1 Tomas Hoger 2008-01-14 08:45:05 UTC
Upstream fix in 1.1.9.1 seems to address these additional vectors too.  xine-lib
maintainers, what do you think?

Comment 2 Ville Skyttä 2008-01-26 22:45:22 UTC
Upstream confirms that this is fixed in 1.1.9.1:
http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=461fae9b8fca;style=gitweb


Note You need to log in before you can comment on or make changes to this bug.