Package: libxine1
Version: 1.1.10-1
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libxine1.

CVE-2008-0486[0]:
| Array index vulnerability in libmpdemux/demux_audio.c in MPlayer
| 1.0rc2 and SVN before r25917, and possibly earlier versions, as used
| in Xine-lib 1.1.10, might allow remote attackers to execute arbitrary
| code via a crafted FLAC tag, which triggers a buffer overflow.

I attached a patch ported from the mplayer fix to xine-lib.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
--- demux_flac.c	2008-01-25 22:54:50.000000000 +0100
+++ demux_flac.c.new	2008-02-08 14:02:37.000000000 +0100
@@ -212,6 +212,8 @@
             ptr += 4;
 
             comment = (char*) ptr;
+            if(&comment[length] < comments || &comment[length] >= &comments[block_length])
+                return;
             c = comment[length];
             comment[length] = 0;
 

Attachment: pgpq5by7nfMUs.pgp
Description: PGP signature

Reply via email to