Lucene search

K
gentooGentoo FoundationGLSA-200510-08
HistoryOct 08, 2005 - 12:00 a.m.

xine-lib: Format string vulnerability

2005-10-0800:00:00
Gentoo Foundation
security.gentoo.org
13

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.8%

Background

xine-lib is a multimedia library which can be utilized to create multimedia frontends. It includes functions to retrieve information about audio CD contents from public CDDB servers.

Description

Ulf Harnhammar discovered a format string bug in the routines handling CDDB server response contents.

Impact

An attacker could submit malicious information about an audio CD to a public CDDB server (or impersonate a public CDDB server). When the victim plays this CD on a multimedia frontend relying on xine-lib, it could end up executing arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All xine-lib users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose media-libs/xine-lib
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/xine-lib< 1.1.0-r5UNKNOWN

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.8%