Package: xine-lib
Version: 1.0.1-1sarge5
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xine-lib.

CVE-2008-0225[0]:
| Heap-based buffer overflow in the rmff_dump_cont function in
| input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote
| attackers to execute arbitrary code via the SDP Abstract attribute,
| related to the rmff_dump_header function and related to disregarding
| the max field.  NOTE: some of these details are obtained from third
| party information.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgps0bEEEtI1r.pgp
Description: PGP signature

Reply via email to