Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN123-1 : xine-lib vulnerabilities


Vulnerability Assessment Details

USN123-1 : xine-lib vulnerabilities

Vulnerability Assessment Summary
xine-lib vulnerabilities

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- libxine-dev
- libxine1


Description :

Two buffer overflows have been discovered in the MMS and Real RTSP
stream handlers of the Xine library. By tricking a user to connect to
a malicious MMS or RTSP video/audio stream source with an application
that uses this library, a possible hacker could crash the client and
possibly even execute arbitrary code with the rights of the player
application.

Solution :

Upgrade to :
- libxine-dev-1.0-1ubuntu3.1 (Ubuntu 5.04)
- libxine1-1.0-1ubuntu3.1 (Ubuntu 5.04)



Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

SIIG Serial ATA 4-Channel RAID
$53.83
SIIG Serial ATA 4-Channel RAID pictureDELL H200 DUAL PORT 6GB PCIE SAS RAID CONTROLLER D P/N 3J8FW
$29.95
DELL H200 DUAL PORT 6GB PCIE SAS RAID CONTROLLER D P/N 3J8FW pictureE91267 E91267-202 E91267-203 INTEL RAID EXPANDER STORAGE CONTROLLER
$64.99
E91267 E91267-202 E91267-203 INTEL RAID EXPANDER STORAGE CONTROLLER pictureLSI SAS 9260-4I Megaraid 6GB/ S 2.0X8 PCI-E Raid Controller Card L3-25121-86C
$19.99
LSI SAS 9260-4I Megaraid 6GB/ S 2.0X8 PCI-E Raid Controller Card L3-25121-86C  picture


Discussions

No Discussions have been posted on this vulnerability.