Bug 428621 - (CVE-2008-0238) CVE-2008-0238 xine-lib: SDP attributes buffer overflow
CVE-2008-0238 xine-lib: SDP attributes buffer overflow
Status: CLOSED CURRENTRELEASE
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
http://nvd.nist.gov/nvd.cfm?cvename=C...
source=cve,reported=20080111,public=2...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-01-14 03:21 EST by Tomas Hoger
Modified: 2008-01-26 17:45 EST (History)
4 users (show)

See Also:
Fixed In Version: 1.1.9.1
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2008-01-26 17:45:22 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Tomas Hoger 2008-01-14 03:21:56 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-0238 to the following vulnerability:

Multiple heap-based buffer overflows in the rmff_dump_cont function in
input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to
execute arbitrary code via the SDP (1) Title, (2) Author, or (3)
Copyright attribute, related to the rmff_dump_header function,
different vectors than CVE-2008-0225. NOTE: the provenance of this
information is unknown; the details are obtained solely from third
party information.

References:
http://secunia.com/advisories/28384
Comment 1 Tomas Hoger 2008-01-14 03:45:05 EST
Upstream fix in 1.1.9.1 seems to address these additional vectors too.  xine-lib
maintainers, what do you think?
Comment 2 Ville Skyttä 2008-01-26 17:45:22 EST
Upstream confirms that this is fixed in 1.1.9.1:
http://hg.debian.org/hg/xine-lib/xine-lib?cmd=changeset;node=461fae9b8fca;style=gitweb

Note You need to log in before you can comment on or make changes to this bug.