Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.840193
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-635-1)
Summary:The remote host is missing an update for the 'xine-lib' package(s) announced via the USN-635-1 advisory.
Description:Summary:
The remote host is missing an update for the 'xine-lib' package(s) announced via the USN-635-1 advisory.

Vulnerability Insight:
Alin Rad Pop discovered an array index vulnerability in the SDP
parser. If a user or automated system were tricked into opening a
malicious RTSP stream, a remote attacker may be able to execute
arbitrary code with the privileges of the user invoking the program.
(CVE-2008-0073)

Luigi Auriemma discovered that xine-lib did not properly check
buffer sizes in the RTSP header-handling code. If xine-lib opened an
RTSP stream with crafted SDP attributes, a remote attacker may be
able to execute arbitrary code with the privileges of the user
invoking the program. (CVE-2008-0225, CVE-2008-0238)

Damian Frizza and Alfredo Ortega discovered that xine-lib did not
properly validate FLAC tags. If a user or automated system were
tricked into opening a crafted FLAC file, a remote attacker may be
able to execute arbitrary code with the privileges of the user
invoking the program. (CVE-2008-0486)

It was discovered that the ASF demuxer in xine-lib did not properly
check the length if the ASF header. If a user or automated system
were tricked into opening a crafted ASF file, a remote attacker
could cause a denial of service or possibly execute arbitrary code
with the privileges of the user invoking the program. (CVE-2008-1110)

It was discovered that the Matroska demuxer in xine-lib did not
properly verify frame sizes. If xine-lib opened a crafted ASF file,
a remote attacker could cause a denial of service or possibly
execute arbitrary code with the privileges of the user invoking
the program. (CVE-2008-1161)

Luigi Auriemma discovered multiple integer overflows in xine-lib. If
a user or automated system were tricked into opening a crafted FLV,
MOV, RM, MVE, MKV or CAK file, a remote attacker may be able to
execute arbitrary code with the privileges of the user invoking the
program. (CVE-2008-1482)

It was discovered that xine-lib did not properly validate its input
when processing Speex file headers. If a user or automated system
were tricked into opening a specially crafted Speex file, an
attacker could create a denial of service or possibly execute
arbitrary code as the user invoking the program. (CVE-2008-1686)

Guido Landi discovered a stack-based buffer overflow in xine-lib
when processing NSF files. If xine-lib opened a specially crafted
NSF file with a long NSF title, an attacker could create a denial of
service or possibly execute arbitrary code as the user invoking the
program. (CVE-2008-1878)

Affected Software/OS:
'xine-lib' package(s) on Ubuntu 6.06, Ubuntu 7.04, Ubuntu 7.10, Ubuntu 8.04.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-0073
BugTraq ID: 28312
http://www.securityfocus.com/bid/28312
Debian Security Information: DSA-1536 (Google Search)
http://www.debian.org/security/2008/dsa-1536
Debian Security Information: DSA-1543 (Google Search)
http://www.debian.org/security/2008/dsa-1543
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00456.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00143.html
http://security.gentoo.org/glsa/glsa-200804-25.xml
http://security.gentoo.org/glsa/glsa-200808-01.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:178
http://www.mandriva.com/security/advisories?name=MDVSA-2008:219
http://secunia.com/secunia_research/2008-10/
http://www.securitytracker.com/id?1019682
http://secunia.com/advisories/28694
http://secunia.com/advisories/29392
http://secunia.com/advisories/29472
http://secunia.com/advisories/29503
http://secunia.com/advisories/29578
http://secunia.com/advisories/29601
http://secunia.com/advisories/29740
http://secunia.com/advisories/29766
http://secunia.com/advisories/29800
http://secunia.com/advisories/30581
http://secunia.com/advisories/31372
http://secunia.com/advisories/31393
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.392408
SuSE Security Announcement: SUSE-SR:2008:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
SuSE Security Announcement: SUSE-SR:2008:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html
http://www.ubuntu.com/usn/usn-635-1
http://www.vupen.com/english/advisories/2008/0923
http://www.vupen.com/english/advisories/2008/0985
XForce ISS Database: xinelib-sdpplinparse-bo(41339)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41339
Common Vulnerability Exposure (CVE) ID: CVE-2008-0225
BugTraq ID: 27198
http://www.securityfocus.com/bid/27198
Debian Security Information: DSA-1472 (Google Search)
http://www.debian.org/security/2008/dsa-1472
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00592.html
http://security.gentoo.org/glsa/glsa-200801-12.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:020
http://www.mandriva.com/security/advisories?name=MDVSA-2008:045
http://aluigi.altervista.org/adv/xinermffhof-adv.txt
http://secunia.com/advisories/28384
http://secunia.com/advisories/28489
http://secunia.com/advisories/28507
http://secunia.com/advisories/28636
http://secunia.com/advisories/28674
http://secunia.com/advisories/28955
SuSE Security Announcement: SUSE-SR:2008:002 (Google Search)
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
http://www.vupen.com/english/advisories/2008/0163
Common Vulnerability Exposure (CVE) ID: CVE-2008-0238
Common Vulnerability Exposure (CVE) ID: CVE-2008-0486
BugTraq ID: 27441
http://www.securityfocus.com/bid/27441
Bugtraq: 20080204 CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability (Google Search)
http://www.securityfocus.com/archive/1/487501/100/0/threaded
Debian Security Information: DSA-1496 (Google Search)
http://www.debian.org/security/2008/dsa-1496
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00395.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00442.html
http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060033.html
http://security.gentoo.org/glsa/glsa-200802-12.xml
http://security.gentoo.org/glsa/glsa-200803-16.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:046
http://www.coresecurity.com/?action=item&id=2103
http://secunia.com/advisories/28779
http://secunia.com/advisories/28801
http://secunia.com/advisories/28918
http://secunia.com/advisories/28956
http://secunia.com/advisories/28989
http://secunia.com/advisories/29141
http://secunia.com/advisories/29307
http://secunia.com/advisories/29323
http://securityreason.com/securityalert/3608
SuSE Security Announcement: SUSE-SR:2008:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
http://www.vupen.com/english/advisories/2008/0406/references
http://www.vupen.com/english/advisories/2008/0421
Common Vulnerability Exposure (CVE) ID: CVE-2008-1110
https://www.exploit-db.com/exploits/1641
XForce ISS Database: xinelib-demuxasf-bo(41019)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41019
Common Vulnerability Exposure (CVE) ID: CVE-2008-1161
BugTraq ID: 28543
http://www.securityfocus.com/bid/28543
XForce ISS Database: xinelib-demuxer-bo(41172)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41172
Common Vulnerability Exposure (CVE) ID: CVE-2008-1482
BugTraq ID: 28370
http://www.securityfocus.com/bid/28370
Bugtraq: 20080320 Multiple heap overflows in xine-lib 1.1.11 (Google Search)
http://www.securityfocus.com/archive/1/489894/100/0/threaded
Debian Security Information: DSA-1586 (Google Search)
http://www.debian.org/security/2008/dsa-1586
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00157.html
http://aluigi.altervista.org/adv/xinehof-adv.txt
http://aluigi.org/poc/xinehof.zip
http://secunia.com/advisories/29484
http://secunia.com/advisories/29600
http://secunia.com/advisories/29622
http://secunia.com/advisories/29756
http://secunia.com/advisories/30337
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.441137
http://securityreason.com/securityalert/3769
SuSE Security Announcement: SUSE-SR:2008:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
http://www.vupen.com/english/advisories/2008/0981/references
XForce ISS Database: xinelib-multiple-bo(41350)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41350
Common Vulnerability Exposure (CVE) ID: CVE-2008-1686
BugTraq ID: 28665
http://www.securityfocus.com/bid/28665
Bugtraq: 20080417 [oCERT-2008-004] multiple speex implementations insufficientboundary checks (Google Search)
http://www.securityfocus.com/archive/1/491009/100/0/threaded
Debian Security Information: DSA-1584 (Google Search)
http://www.debian.org/security/2008/dsa-1584
Debian Security Information: DSA-1585 (Google Search)
http://www.debian.org/security/2008/dsa-1585
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00244.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00287.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00357.html
http://security.gentoo.org/glsa/glsa-200804-17.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:092
http://www.mandriva.com/security/advisories?name=MDVSA-2008:093
http://www.mandriva.com/security/advisories?name=MDVSA-2008:094
http://www.mandriva.com/security/advisories?name=MDVSA-2008:124
http://www.ocert.org/advisories/ocert-2008-004.html
http://www.ocert.org/advisories/ocert-2008-2.html
http://lists.xiph.org/pipermail/speex-dev/2008-April/006636.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10026
http://www.redhat.com/support/errata/RHSA-2008-0235.html
http://www.securitytracker.com/id?1019875
http://secunia.com/advisories/29672
http://secunia.com/advisories/29727
http://secunia.com/advisories/29835
http://secunia.com/advisories/29845
http://secunia.com/advisories/29854
http://secunia.com/advisories/29866
http://secunia.com/advisories/29878
http://secunia.com/advisories/29880
http://secunia.com/advisories/29881
http://secunia.com/advisories/29882
http://secunia.com/advisories/29898
http://secunia.com/advisories/30104
http://secunia.com/advisories/30117
http://secunia.com/advisories/30119
http://secunia.com/advisories/30353
http://secunia.com/advisories/30358
http://secunia.com/advisories/30717
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.460836
SuSE Security Announcement: SUSE-SR:2008:013 (Google Search)
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.ubuntu.com/usn/usn-611-1
http://www.ubuntu.com/usn/usn-611-2
http://www.ubuntu.com/usn/usn-611-3
http://www.vupen.com/english/advisories/2008/1187/references
http://www.vupen.com/english/advisories/2008/1228/references
http://www.vupen.com/english/advisories/2008/1268/references
http://www.vupen.com/english/advisories/2008/1269/references
http://www.vupen.com/english/advisories/2008/1300/references
http://www.vupen.com/english/advisories/2008/1301/references
http://www.vupen.com/english/advisories/2008/1302/references
XForce ISS Database: fishsound-libfishsound-speex-bo(41684)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41684
Common Vulnerability Exposure (CVE) ID: CVE-2008-1878
BugTraq ID: 28816
http://www.securityfocus.com/bid/28816
https://www.exploit-db.com/exploits/5458
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00536.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00571.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:177
http://secunia.com/advisories/29850
http://secunia.com/advisories/30021
http://www.vupen.com/english/advisories/2008/1247/references
XForce ISS Database: xinelib-demuxnsfsendchunk-bo(41865)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41865
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.