Package: xine-lib Version: 1.0.1-1sarge5 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xine-lib.
CVE-2008-0225[0]: | Heap-based buffer overflow in the rmff_dump_cont function in | input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote | attackers to execute arbitrary code via the SDP Abstract attribute, | related to the rmff_dump_header function and related to disregarding | the max field. NOTE: some of these details are obtained from third | party information. If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgps0bEEEtI1r.pgp
Description: PGP signature