Source: xine-lib Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xine-lib.
CVE-2008-5239[0]: | xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not | properly handle (a) negative and (b) zero values during unspecified | read function calls in input_file.c, input_net.c, input_smb.c, and | input_http.c, which allows remote attackers to cause a denial of | service (crash) or possibly execute arbitrary code via vectors such as | (1) a file or (2) an HTTP response, which triggers consequences such | as out-of-bounds reads and heap-based buffer overflows. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239 http://security-tracker.debian.net/tracker/CVE-2008-5239 -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpLF44X5P4lP.pgp
Description: PGP signature