Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.892603
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-2603-1)
Summary:The remote host is missing an update for the Debian 'libmediainfo' package(s) announced via the DLA-2603-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'libmediainfo' package(s) announced via the DLA-2603-1 advisory.

Vulnerability Insight:
It was discovered that there were a number of vulnerabilities in libmediainfo, a library reading metadata such as track names, lengths, etc. from media files.

CVE-2019-11372

An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.

CVE-2019-11373

An out-of-bounds read in File__Analyze::Get_L8 in File__Analyze_Buffer.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.

CVE-2020-15395

In MediaInfoLib in MediaArea MediaInfo 20.03, there is a stack-based buffer over-read in Streams_Fill_PerStream in Multiple/File_MpegPs.cpp (aka an off-by-one during MpegPs parsing).

CVE-2020-26797

Mediainfo before version 20.08 has a heap buffer overflow vulnerability via MediaInfoLib::File_Gxf::ChooseParser_ChannelGrouping.

For Debian 9 Stretch, these problems have been fixed in version 0.7.91-1+deb9u1.

We recommend that you upgrade your libmediainfo packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'libmediainfo' package(s) on Debian 9.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-11372
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOA4AWTRLWVQBZZAKXXQHP7M2NK6CB3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYF5I42OBJR7HKJD2OFS6LP26I52IT3M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B752JY7TABWSVYHFATD37XDD6PVIO5C6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BC4Z4BGGMSSVTRKVD3OCW4JLH3K2ZNGP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJYASICJ2VUUNGHDBB62FGYQN2SNITM5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYKBAXS35KFMU4YLO37VGDIKHEL5HSPO/
https://github.com/MediaArea/MediaInfoLib/pull/1111
https://sourceforge.net/p/mediainfo/bugs/1101/
SuSE Security Announcement: openSUSE-SU-2019:1629 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00069.html
SuSE Security Announcement: openSUSE-SU-2019:1658 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00083.html
SuSE Security Announcement: openSUSE-SU-2019:1889 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00028.html
https://usn.ubuntu.com/3988-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-11373
Common Vulnerability Exposure (CVE) ID: CVE-2020-15395
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QQJCEQRRPTN5CY5URDFTEJU3A2VKLNBA/
https://mediaarea.net/en/MediaInfo
https://sourceforge.net/p/mediainfo/bugs/1127/
Common Vulnerability Exposure (CVE) ID: CVE-2020-26797
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYI2372RLWYQVLSYD5PBI4YTXNMVDZCZ/
https://sourceforge.net/p/mediainfo/bugs/1154/
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.