Source: xine-lib
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xine-lib.

CVE-2008-5239[0]:
| xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not
| properly handle (a) negative and (b) zero values during unspecified
| read function calls in input_file.c, input_net.c, input_smb.c, and
| input_http.c, which allows remote attackers to cause a denial of
| service (crash) or possibly execute arbitrary code via vectors such as
| (1) a file or (2) an HTTP response, which triggers consequences such
| as out-of-bounds reads and heap-based buffer overflows.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239
    http://security-tracker.debian.net/tracker/CVE-2008-5239

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpLF44X5P4lP.pgp
Description: PGP signature

Reply via email to