USN-746-1: xine-lib vulnerability

Publication date

26 March 2009

Overview

xine-lib vulnerability


Packages

Details

It was discovered that the 4xm demuxer in xine-lib did not correctly handle
a large current_track value in a 4xm file, resulting in an integer
overflow. If a user or automated system were tricked into opening a
specially crafted 4xm movie file, an attacker could crash xine-lib or
possibly execute arbitrary code with the privileges of the user invoking
the program. (CVE-2009-0698)

USN-710-1 provided updated xine-lib packages to fix multiple security
vulnerabilities. The security patch to fix CVE-2008-5239 introduced a
regression causing some media files to be unplayable. This update corrects
the problem. We apologize for the inconvenience.

Original advisory details:
It was discovered that the input handlers in xine-lib did not correctly
handle certain error codes, resulting in out-of-bounds reads and heap-
based buffer overflows. If a user or...

It was discovered that the 4xm demuxer in xine-lib did not correctly handle
a large current_track value in a 4xm file, resulting in an integer
overflow. If a user or automated system were tricked into opening a
specially crafted 4xm movie file, an attacker could crash xine-lib or
possibly execute arbitrary code with the privileges of the user invoking
the program. (CVE-2009-0698)

USN-710-1 provided updated xine-lib packages to fix multiple security
vulnerabilities. The security patch to fix CVE-2008-5239 introduced a
regression causing some media files to be unplayable. This update corrects
the problem. We apologize for the inconvenience.

Original advisory details:
It was discovered that the input handlers in xine-lib did not correctly
handle certain error codes, resulting in out-of-bounds reads and heap-
based buffer overflows. If a user or automated system were tricked into
opening a specially crafted file, stream, or URL, an attacker could
execute arbitrary code as the user invoking the program. (CVE-2008-5239)


Update instructions

After a standard system upgrade you need to restart applications linked against xine-lib, such as Totem-xine and Amarok, to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
8.10 intrepid libxine1 –  1.1.15-0ubuntu3.2
8.04 hardy libxine1 –  1.1.11.1-1ubuntu3.3
7.10 gutsy libxine1 –  1.1.7-1ubuntu1.5
6.06 dapper libxine-main1 –  1.1.1+ubuntu2-7.11

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›