Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.61038
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1586-1)
Summary:The remote host is missing an update for the Debian 'xine-lib' package(s) announced via the DSA-1586-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'xine-lib' package(s) announced via the DSA-1586-1 advisory.

Vulnerability Insight:
Multiple vulnerabilities have been discovered in xine-lib, a library which supplies most of the application functionality of the xine multimedia player. The Common Vulnerabilities and Exposures project identifies the following three problems:

CVE-2008-1482

Integer overflow vulnerabilities exist in xine's FLV, QuickTime, RealMedia, MVE and CAK demuxers, as well as the EBML parser used by the Matroska demuxer. These weaknesses allow an attacker to overflow heap buffers and potentially execute arbitrary code by supplying a maliciously crafted file of those types.

CVE-2008-1686

Insufficient input validation in the Speex implementation used by this version of xine enables an invalid array access and the execution of arbitrary code by supplying a maliciously crafted Speex file.

CVE-2008-1878

Inadequate bounds checking in the NES Sound Format (NSF) demuxer enables a stack buffer overflow and the execution of arbitrary code through a maliciously crafted NSF file.

For the stable distribution (etch), these problems have been fixed in version 1.1.2+dfsg-7.

For the unstable distribution (sid), these problems have been fixed in version 1.1.12-2.

We recommend that you upgrade your xine-lib packages.

Affected Software/OS:
'xine-lib' package(s) on Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-1482
BugTraq ID: 28370
http://www.securityfocus.com/bid/28370
Bugtraq: 20080320 Multiple heap overflows in xine-lib 1.1.11 (Google Search)
http://www.securityfocus.com/archive/1/489894/100/0/threaded
Debian Security Information: DSA-1586 (Google Search)
http://www.debian.org/security/2008/dsa-1586
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00157.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html
http://security.gentoo.org/glsa/glsa-200808-01.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:178
http://aluigi.altervista.org/adv/xinehof-adv.txt
http://aluigi.org/poc/xinehof.zip
http://secunia.com/advisories/29484
http://secunia.com/advisories/29600
http://secunia.com/advisories/29622
http://secunia.com/advisories/29740
http://secunia.com/advisories/29756
http://secunia.com/advisories/30337
http://secunia.com/advisories/31372
http://secunia.com/advisories/31393
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.441137
http://securityreason.com/securityalert/3769
SuSE Security Announcement: SUSE-SR:2008:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
http://www.ubuntu.com/usn/usn-635-1
http://www.vupen.com/english/advisories/2008/0981/references
XForce ISS Database: xinelib-multiple-bo(41350)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41350
Common Vulnerability Exposure (CVE) ID: CVE-2008-1686
BugTraq ID: 28665
http://www.securityfocus.com/bid/28665
Bugtraq: 20080417 [oCERT-2008-004] multiple speex implementations insufficientboundary checks (Google Search)
http://www.securityfocus.com/archive/1/491009/100/0/threaded
Debian Security Information: DSA-1584 (Google Search)
http://www.debian.org/security/2008/dsa-1584
Debian Security Information: DSA-1585 (Google Search)
http://www.debian.org/security/2008/dsa-1585
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00244.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00287.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00357.html
http://security.gentoo.org/glsa/glsa-200804-17.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:092
http://www.mandriva.com/security/advisories?name=MDVSA-2008:093
http://www.mandriva.com/security/advisories?name=MDVSA-2008:094
http://www.mandriva.com/security/advisories?name=MDVSA-2008:124
http://www.ocert.org/advisories/ocert-2008-004.html
http://www.ocert.org/advisories/ocert-2008-2.html
http://lists.xiph.org/pipermail/speex-dev/2008-April/006636.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10026
http://www.redhat.com/support/errata/RHSA-2008-0235.html
http://www.securitytracker.com/id?1019875
http://secunia.com/advisories/29672
http://secunia.com/advisories/29727
http://secunia.com/advisories/29835
http://secunia.com/advisories/29845
http://secunia.com/advisories/29854
http://secunia.com/advisories/29866
http://secunia.com/advisories/29878
http://secunia.com/advisories/29880
http://secunia.com/advisories/29881
http://secunia.com/advisories/29882
http://secunia.com/advisories/29898
http://secunia.com/advisories/30104
http://secunia.com/advisories/30117
http://secunia.com/advisories/30119
http://secunia.com/advisories/30353
http://secunia.com/advisories/30358
http://secunia.com/advisories/30581
http://secunia.com/advisories/30717
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.460836
SuSE Security Announcement: SUSE-SR:2008:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
SuSE Security Announcement: SUSE-SR:2008:013 (Google Search)
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.ubuntu.com/usn/usn-611-1
http://www.ubuntu.com/usn/usn-611-2
http://www.ubuntu.com/usn/usn-611-3
http://www.vupen.com/english/advisories/2008/1187/references
http://www.vupen.com/english/advisories/2008/1228/references
http://www.vupen.com/english/advisories/2008/1268/references
http://www.vupen.com/english/advisories/2008/1269/references
http://www.vupen.com/english/advisories/2008/1300/references
http://www.vupen.com/english/advisories/2008/1301/references
http://www.vupen.com/english/advisories/2008/1302/references
XForce ISS Database: fishsound-libfishsound-speex-bo(41684)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41684
Common Vulnerability Exposure (CVE) ID: CVE-2008-1878
BugTraq ID: 28816
http://www.securityfocus.com/bid/28816
https://www.exploit-db.com/exploits/5458
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00536.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00571.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:177
http://secunia.com/advisories/29850
http://secunia.com/advisories/30021
http://www.vupen.com/english/advisories/2008/1247/references
XForce ISS Database: xinelib-demuxnsfsendchunk-bo(41865)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41865
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.