Lucene search

K
gentooGentoo FoundationGLSA-200708-02
HistoryAug 08, 2007 - 12:00 a.m.

Xvid: Array indexing vulnerabilities

2007-08-0800:00:00
Gentoo Foundation
security.gentoo.org
15

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.132 Low

EPSS

Percentile

95.5%

Background

Xvid is a popular open source video codec licensed under the GPL.

Description

Trixter Jack discovered an array indexing error in the get_intra_block() function in the file src/bitstream/mbcoding.c. The get_inter_block_h263() and get_inter_block_mpeg() functions in the same file were also reported as vulnerable.

Impact

An attacker could exploit these vulnerabilities to execute arbitrary code by tricking a user or automated system into processing a malicious video file with an application that makes use of the Xvid library.

Workaround

There is no known workaround at this time.

Resolution

All Xvid users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/xvid-1.1.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-libs/xvid< 1.1.3UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.132 Low

EPSS

Percentile

95.5%