Mandrake Linux Security Advisory : xine-lib (MDKSA-2005:011)

critical Nessus Plugin ID 16220

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

iDefense discovered that the PNA_TAG handling code in pnm_get_chunk() does not check if the input size is larger than the buffer size (CVE-2004-1187). As well, they discovered that in this same function, a negative value could be given to an unsigned variable that specifies the read length of input data (CVE-2004-1188).

Ariel Berkman discovered that xine-lib reads specific input data into an array without checking the input size making it vulnerable to a buffer overflow problem (CVE-2004-1300).

The updated packages have been patched to prevent these problems.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?93d1630b

http://www.nessus.org/u?53a5919c

Plugin Details

Severity: Critical

ID: 16220

File Name: mandrake_MDKSA-2005-011.nasl

Version: 1.20

Type: local

Published: 1/19/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64xine1, p-cpe:/a:mandriva:linux:lib64xine1-devel, p-cpe:/a:mandriva:linux:libxine1, p-cpe:/a:mandriva:linux:libxine1-devel, p-cpe:/a:mandriva:linux:xine-aa, p-cpe:/a:mandriva:linux:xine-arts, p-cpe:/a:mandriva:linux:xine-dxr3, p-cpe:/a:mandriva:linux:xine-esd, p-cpe:/a:mandriva:linux:xine-flac, p-cpe:/a:mandriva:linux:xine-gnomevfs, p-cpe:/a:mandriva:linux:xine-plugins, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:10.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 1/19/2005

Reference Information

CVE: CVE-2004-1187, CVE-2004-1188, CVE-2004-1300

MDKSA: 2005:011