{"href": "https://vulners.com/osvdb/OSVDB:37382", "id": "OSVDB:37382", "reporter": "OSVDB", "published": "2007-06-20T13:19:03", "description": "## Solution Description\nUpgrade to version 0.8.6c or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\n[Secunia Advisory ID:25753](https://secuniaresearch.flexerasoftware.com/advisories/25753/)\n[Secunia Advisory ID:25980](https://secuniaresearch.flexerasoftware.com/advisories/25980/)\n[Secunia Advisory ID:26269](https://secuniaresearch.flexerasoftware.com/advisories/26269/)\n[Related OSVDB ID: 37379](https://vulners.com/osvdb/OSVDB:37379)\n[Related OSVDB ID: 37381](https://vulners.com/osvdb/OSVDB:37381)\n[Related OSVDB ID: 37380](https://vulners.com/osvdb/OSVDB:37380)\nOther Advisory URL: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00093.html\nOther Advisory URL: http://www.videolan.org/sa0702.html\nOther Advisory URL: http://www.gentoo.org/security/en/glsa/glsa-200707-12.xml\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-06/0270.html\nFrSIRT Advisory: ADV-2007-2262\n[CVE-2007-3316](https://vulners.com/cve/CVE-2007-3316)\nCERT VU: 200928\nBugtraq ID: 24555\n", "title": "VLC Media Player Service Announce Protocol (SAP) Multicast Packet Format String", "lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "type": "osvdb", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "references": [], "edition": 1, "cvelist": ["CVE-2007-3316"], "affectedSoftware": [], "viewCount": 3, "enchantments": {"score": {"value": 6.4, "vector": "NONE", "modified": "2017-04-28T13:20:33", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2007-3316"]}, {"type": "openvas", "idList": ["OPENVAS:58834", "OPENVAS:58533", "OPENVAS:58453"]}, {"type": "osvdb", "idList": ["OSVDB:37381", "OSVDB:37379", "OSVDB:37380"]}, {"type": "nessus", "idList": ["DEBIAN_DSA-1332.NASL", "GENTOO_GLSA-200707-12.NASL", "FREEBSD_PKG_7128FB45263311DC94DA0016179B2DD5.NASL"]}, {"type": "gentoo", "idList": ["GLSA-200707-12"]}, {"type": "cert", "idList": ["VU:200928"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:7839"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1332-1:B084C"]}, {"type": "freebsd", "idList": ["7128FB45-2633-11DC-94DA-0016179B2DD5"]}], "modified": "2017-04-28T13:20:33", "rev": 2}, "vulnersScore": 6.4}, "modified": "2007-06-20T13:19:03"}
{"cve": [{"lastseen": "2020-10-03T11:45:52", "description": "Multiple format string vulnerabilities in plugins in VideoLAN VLC Media Player before 0.8.6c allow remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in (1) an Ogg/Vorbis file, (2) an Ogg/Theora file, (3) a CDDB entry for a CD Digital Audio (CDDA) file, or (4) Service Announce Protocol (SAP) multicast packets.", "edition": 3, "cvss3": {}, "published": "2007-06-21T18:30:00", "title": "CVE-2007-3316", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-3316"], "modified": "2018-10-16T16:48:00", "cpe": ["cpe:/a:videolan:vlc_media_player:0.8.6a", "cpe:/a:videolan:vlc_media_player:0.8.6b"], "id": "CVE-2007-3316", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-3316", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "cvelist": ["CVE-2007-3316"], "description": "## Vulnerability Description\nVLC Media Player contains a format string vulnerability that may allow a malicious user to excecute arbitrary code. The issue is triggered when a specially crafted .ogm (Theora) file is processed by the player. It is possible that the flaw may allow code excecution and memory corruption resulting in a loss of integrity.\n## Solution Description\nUpgrade to version 0.8.6c or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nVLC Media Player contains a format string vulnerability that may allow a malicious user to excecute arbitrary code. The issue is triggered when a specially crafted .ogm (Theora) file is processed by the player. It is possible that the flaw may allow code excecution and memory corruption resulting in a loss of integrity.\n## References:\n[Secunia Advisory ID:25753](https://secuniaresearch.flexerasoftware.com/advisories/25753/)\n[Secunia Advisory ID:25980](https://secuniaresearch.flexerasoftware.com/advisories/25980/)\n[Secunia Advisory ID:26269](https://secuniaresearch.flexerasoftware.com/advisories/26269/)\n[Related OSVDB ID: 37379](https://vulners.com/osvdb/OSVDB:37379)\n[Related OSVDB ID: 37381](https://vulners.com/osvdb/OSVDB:37381)\n[Related OSVDB ID: 37382](https://vulners.com/osvdb/OSVDB:37382)\nOther Advisory URL: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00093.html\nOther Advisory URL: http://www.videolan.org/sa0702.html\nOther Advisory URL: http://www.gentoo.org/security/en/glsa/glsa-200707-12.xml\nOther Advisory URL: http://www.isecpartners.com/advisories/2007-001-vlc.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-06/0270.html\nKeyword: VideoLAN-SA-0702\nFrSIRT Advisory: ADV-2007-2262\n[CVE-2007-3316](https://vulners.com/cve/CVE-2007-3316)\nCERT VU: 200928\nBugtraq ID: 24555\n", "edition": 1, "modified": "2007-06-20T13:19:03", "published": "2007-06-20T13:19:03", "href": "https://vulners.com/osvdb/OSVDB:37380", "id": "OSVDB:37380", "title": "VLC Media Player Ogg/Theora File Handling Plugin Format String", "type": "osvdb", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "cvelist": ["CVE-2007-3316"], "description": "## Solution Description\nUpgrade to version 0.8.6c or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\n[Secunia Advisory ID:25753](https://secuniaresearch.flexerasoftware.com/advisories/25753/)\n[Secunia Advisory ID:25980](https://secuniaresearch.flexerasoftware.com/advisories/25980/)\n[Secunia Advisory ID:26269](https://secuniaresearch.flexerasoftware.com/advisories/26269/)\n[Related OSVDB ID: 37381](https://vulners.com/osvdb/OSVDB:37381)\n[Related OSVDB ID: 37382](https://vulners.com/osvdb/OSVDB:37382)\n[Related OSVDB ID: 37380](https://vulners.com/osvdb/OSVDB:37380)\nOther Advisory URL: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00093.html\nOther Advisory URL: http://www.videolan.org/sa0702.html\nOther Advisory URL: http://www.gentoo.org/security/en/glsa/glsa-200707-12.xml\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-06/0270.html\nFrSIRT Advisory: ADV-2007-2262\n[CVE-2007-3316](https://vulners.com/cve/CVE-2007-3316)\nCERT VU: 200928\nBugtraq ID: 24555\n", "edition": 1, "modified": "2007-06-20T13:19:03", "published": "2007-06-20T13:19:03", "href": "https://vulners.com/osvdb/OSVDB:37379", "id": "OSVDB:37379", "title": "VLC Media Player Ogg/Vorbis File Handling Plugin Format String", "type": "osvdb", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-04-28T13:20:33", "bulletinFamily": "software", "cvelist": ["CVE-2007-3316"], "description": "## Solution Description\nUpgrade to version 0.8.6c or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\n[Secunia Advisory ID:25753](https://secuniaresearch.flexerasoftware.com/advisories/25753/)\n[Secunia Advisory ID:25980](https://secuniaresearch.flexerasoftware.com/advisories/25980/)\n[Secunia Advisory ID:26269](https://secuniaresearch.flexerasoftware.com/advisories/26269/)\n[Related OSVDB ID: 37379](https://vulners.com/osvdb/OSVDB:37379)\n[Related OSVDB ID: 37382](https://vulners.com/osvdb/OSVDB:37382)\n[Related OSVDB ID: 37380](https://vulners.com/osvdb/OSVDB:37380)\nOther Advisory URL: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00093.html\nOther Advisory URL: http://www.videolan.org/sa0702.html\nOther Advisory URL: http://www.gentoo.org/security/en/glsa/glsa-200707-12.xml\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-06/0270.html\nFrSIRT Advisory: ADV-2007-2262\n[CVE-2007-3316](https://vulners.com/cve/CVE-2007-3316)\nCERT VU: 200928\nBugtraq ID: 24555\n", "edition": 1, "modified": "2007-06-20T13:19:03", "published": "2007-06-20T13:19:03", "href": "https://vulners.com/osvdb/OSVDB:37381", "id": "OSVDB:37381", "title": "VLC Media Player CD Digital Audio (CDDA) Plugin CDDB Entry Processing Format String", "type": "osvdb", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-24T12:50:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3316"], "description": "The remote host is missing updates announced in\nadvisory GLSA 200707-12.", "modified": "2017-07-07T00:00:00", "published": "2008-09-24T00:00:00", "id": "OPENVAS:58533", "href": "http://plugins.openvas.org/nasl.php?oid=58533", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200707-12 (vlc)", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been discovered in VLC media player, allowing for the\nremote execution of arbitrary code.\";\ntag_solution = \"All VLC media player users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-video/vlc-0.8.6c'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200707-12\nhttp://bugs.gentoo.org/show_bug.cgi?id=182389\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200707-12.\";\n\n \n\nif(description)\n{\n script_id(58533);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2007-3316\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Gentoo Security Advisory GLSA 200707-12 (vlc)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"media-video/vlc\", unaffected: make_list(\"ge 0.8.6c\"), vulnerable: make_list(\"lt 0.8.6c\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3467", "CVE-2007-3316", "CVE-2007-3468"], "description": "The remote host is missing an update to vlc\nannounced via advisory DSA 1332-1.", "modified": "2017-07-07T00:00:00", "published": "2008-01-17T00:00:00", "id": "OPENVAS:58453", "href": "http://plugins.openvas.org/nasl.php?oid=58453", "type": "openvas", "title": "Debian Security Advisory DSA 1332-1 (vlc)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1332_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1332-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several remote vulnerabilities have been discovered in the VideoLan\nmultimedia player and streamer, which may lead to the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2007-3316\n\nDavid Thiel discovered that several format string vulnerabilities may\nlead to the execution of arbitrary code.\n\nCVE-2007-3467\n\nDavid Thiel discovered an integer overflow in the WAV processing code.\n\nThis update also fixes several crashes, which can be triggered through\nmalformed media files.\n\nFor the oldstable distribution (sarge) these problems have been fixed in\nversion 0.8.1.svn20050314-1sarge3. Packages for the powerpc architecture\nare not yet available. They will be provided later.\n\nFor the stable distribution (etch) these problems have been fixed\nin version 0.8.6-svn20061012.debian-5etch1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 0.8.6.c-1.\n\nWe recommend that you upgrade your vlc packages.\";\ntag_summary = \"The remote host is missing an update to vlc\nannounced via advisory DSA 1332-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201332-1\";\n\nif(description)\n{\n script_id(58453);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:19:52 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2007-3316\", \"CVE-2007-3467\", \"CVE-2007-3468\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1332-1 (vlc)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"gnome-vlc\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"gvlc\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"kvlc\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libvlc0-dev\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-plugin-vlc\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qvlc\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-alsa\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-esd\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-ggi\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-gnome\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-gtk\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-alsa\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-arts\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-esd\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-ggi\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-sdl\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-qt\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-sdl\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wxvlc\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-glide\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-glide\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-svgalib\", ver:\"0.8.1.svn20050314-1sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-alsa\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"wxvlc\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libvlc0\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libvlc0-dev\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"mozilla-plugin-vlc\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-nox\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-arts\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-esd\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-ggi\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-sdl\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-glide\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"vlc-plugin-svgalib\", ver:\"0.8.6-svn20061012.debian-5etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:10:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3467", "CVE-2007-3316", "CVE-2007-3468"], "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-10-04T00:00:00", "published": "2008-09-04T00:00:00", "id": "OPENVAS:58834", "href": "http://plugins.openvas.org/nasl.php?oid=58834", "type": "openvas", "title": "FreeBSD Ports: vlc", "sourceData": "#\n#VID 7128fb45-2633-11dc-94da-0016179b2dd5\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: vlc\n\n=====\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://www.isecpartners.com/advisories/2007-001-vlc.txt\nhttp://www.vuxml.org/freebsd/7128fb45-2633-11dc-94da-0016179b2dd5.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(58834);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 4203 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-10-04 07:30:30 +0200 (Tue, 04 Oct 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2007-3316\", \"CVE-2007-3468\", \"CVE-2007-3467\");\n script_name(\"FreeBSD Ports: vlc\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"vlc\");\nif(!isnull(bver) && revcomp(a:bver, b:\"0.8.6c\")<0) {\n txt += 'Package vlc version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cert": [{"lastseen": "2020-09-18T20:42:35", "bulletinFamily": "info", "cvelist": ["CVE-2007-3316"], "description": "### Overview \n\nVLC contains a format string vulnerability that may allow an attacker to execute code.\n\n### Description \n\nVideoLAN (VLC) is a streaming media player that runs on multiple platforms. \n\nFrom VideoLAN Security Advisory [0702](<http://www.videolan.org/sa0702.html>): \n \n_VLC media player Ogg/Vorbis, Ogg/Theora, CDDA (CD Digital Audio) and SAP (Service Announce Protocol) plugins are prone to a C-style format string vulnerability when trying to parse a media data stream. \n \nValid but carefully crafted .ogg (Vorbis) or .ogm (Theora) files, CDDB entries or SAP/SDP messages can trigger the bug. We therefore consider this bug to have a high severity._ \n \nNote that VLC distributes a [plugin](<http://www.videolan.org/doc/vlc-user-guide/en/ch07.html>) for Mozilla-based browsers. If the VLC browser plugin is used, an attacker may be able to exploit this vulnerability by convincing a user to go to a webpage. \n \n--- \n \n### Impact \n\nA remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running VLC. \n \n--- \n \n### Solution \n\n \n**Upgrade** \nVLC media player [0.8.6c](<http://www.videolan.org/vlc/>) has been released to address this issue. \n \n--- \n \n**Disable the affected components** \n \nDisabling the affected VLC plugins and components may mitigate this vulnerability. See the workarounds section of VideoLAN Security Advisory [0702](<http://www.videolan.org/sa0702.html>) for more details. \n \n--- \n \n### Vendor Information\n\n200928\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### VideoLAN __ Affected\n\nUpdated: July 23, 2007 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nSee <http://www.videolan.org/sa0702.html> for more details.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23200928 Feedback>).\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | | \nTemporal | | \nEnvironmental | | \n \n \n\n\n### References \n\n * <http://www.videolan.org/sa0702.html>\n * <http://www.tech-faq.com/format-string-vulnerability.shtml>\n * <http://www.securityfocus.com/bid/24555>\n * <http://www.frsirt.com/english/advisories/2007/2262>\n * <http://secunia.com/advisories/25753>\n * <http://www.isecpartners.com/advisories/2007-001-vlc.txt>\n\n### Acknowledgements\n\nThanks to the VLC team for information that was used in this report.\n\nThis document was written by Ryan Giobbi.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2007-3316](<http://web.nvd.nist.gov/vuln/detail/CVE-2007-3316>) \n---|--- \n**Severity Metric:** | 8.82 \n**Date Public:** | 2007-06-20 \n**Date First Published:** | 2007-07-23 \n**Date Last Updated: ** | 2007-07-24 16:50 UTC \n**Document Revision: ** | 14 \n", "modified": "2007-07-24T16:50:00", "published": "2007-07-23T00:00:00", "id": "VU:200928", "href": "https://www.kb.cert.org/vuls/id/200928", "type": "cert", "title": "VLC Media Player format string vulnerability", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:09", "bulletinFamily": "unix", "cvelist": ["CVE-2007-3316"], "description": "### Background\n\nVLC media player is a multimedia player for various audio and video formats. \n\n### Description\n\nDavid Thiel from iSEC Partners Inc. discovered format string errors in various plugins when parsing data. The affected plugins include Vorbis, Theora, CDDA and SAP. \n\n### Impact\n\nA remote attacker could entice a user to open a specially crafted media file, possibly resulting in the execution of arbitrary code with the privileges of the user running VLC media player. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll VLC media player users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-video/vlc-0.8.6c\"", "edition": 1, "modified": "2007-07-28T00:00:00", "published": "2007-07-28T00:00:00", "id": "GLSA-200707-12", "href": "https://security.gentoo.org/glsa/200707-12", "type": "gentoo", "title": "VLC media player: Format string vulnerabilities", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-07T10:52:14", "description": "The remote host is affected by the vulnerability described in GLSA-200707-12\n(VLC media player: Format string vulnerabilities)\n\n David Thiel from iSEC Partners Inc. discovered format string errors in\n various plugins when parsing data. The affected plugins include Vorbis,\n Theora, CDDA and SAP.\n \nImpact :\n\n A remote attacker could entice a user to open a specially crafted media\n file, possibly resulting in the execution of arbitrary code with the\n privileges of the user running VLC media player.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "published": "2007-07-30T00:00:00", "title": "GLSA-200707-12 : VLC media player: Format string vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3316"], "modified": "2007-07-30T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:vlc"], "id": "GENTOO_GLSA-200707-12.NASL", "href": "https://www.tenable.com/plugins/nessus/25808", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200707-12.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(25808);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-3316\");\n script_xref(name:\"GLSA\", value:\"200707-12\");\n\n script_name(english:\"GLSA-200707-12 : VLC media player: Format string vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200707-12\n(VLC media player: Format string vulnerabilities)\n\n David Thiel from iSEC Partners Inc. discovered format string errors in\n various plugins when parsing data. The affected plugins include Vorbis,\n Theora, CDDA and SAP.\n \nImpact :\n\n A remote attacker could entice a user to open a specially crafted media\n file, possibly resulting in the execution of arbitrary code with the\n privileges of the user running VLC media player.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200707-12\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All VLC media player users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-video/vlc-0.8.6c'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:vlc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/07/30\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/06/20\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"media-video/vlc\", unaffected:make_list(\"ge 0.8.6c\"), vulnerable:make_list(\"lt 0.8.6c\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"VLC media player\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:45:32", "description": "isecpartners reports :\n\nVLC is vulnerable to a format string attack in the parsing of Vorbis\ncomments in Ogg Vorbis and Ogg Theora files, CDDA data or SAP/SDP\nservice discovery messages. Additionally, there are two errors in the\nhandling of wav files, one a denial of service due to an uninitialized\nvariable, and one integer overflow in sampling frequency calculations.", "edition": 25, "published": "2007-07-01T00:00:00", "title": "FreeBSD : vlc -- format string vulnerability and integer overflow (7128fb45-2633-11dc-94da-0016179b2dd5)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3467", "CVE-2007-3316", "CVE-2007-3468"], "modified": "2007-07-01T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:vlc"], "id": "FREEBSD_PKG_7128FB45263311DC94DA0016179B2DD5.NASL", "href": "https://www.tenable.com/plugins/nessus/25634", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(25634);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-3316\", \"CVE-2007-3467\", \"CVE-2007-3468\");\n\n script_name(english:\"FreeBSD : vlc -- format string vulnerability and integer overflow (7128fb45-2633-11dc-94da-0016179b2dd5)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"isecpartners reports :\n\nVLC is vulnerable to a format string attack in the parsing of Vorbis\ncomments in Ogg Vorbis and Ogg Theora files, CDDA data or SAP/SDP\nservice discovery messages. Additionally, there are two errors in the\nhandling of wav files, one a denial of service due to an uninitialized\nvariable, and one integer overflow in sampling frequency calculations.\"\n );\n # http://www.isecpartners.com/advisories/2007-001-vlc.txt\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.nccgroup.trust/advisories/2007-001-vlc.txt\"\n );\n # https://vuxml.freebsd.org/freebsd/7128fb45-2633-11dc-94da-0016179b2dd5.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4d09ca5b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:vlc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/06/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/06/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/07/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"vlc<0.8.6c\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:44:48", "description": "Several remote vulnerabilities have been discovered in the VideoLan\nmultimedia player and streamer, which may lead to the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2007-3316\n David Thiel discovered that several format string\n vulnerabilities may lead to the execution of arbitrary\n code.\n\n - CVE-2007-3467\n David Thiel discovered an integer overflow in the WAV\n processing code.\n\nThis update also fixes several crashes, which can be triggered through\nmalformed media files.", "edition": 27, "published": "2007-07-11T00:00:00", "title": "Debian DSA-1332-1 : vlc - several vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-3467", "CVE-2007-3316", "CVE-2007-3468"], "modified": "2007-07-11T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:4.0", "cpe:/o:debian:debian_linux:3.1", "p-cpe:/a:debian:debian_linux:vlc"], "id": "DEBIAN_DSA-1332.NASL", "href": "https://www.tenable.com/plugins/nessus/25695", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1332. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(25695);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2007-3316\", \"CVE-2007-3467\", \"CVE-2007-3468\");\n script_xref(name:\"DSA\", value:\"1332\");\n\n script_name(english:\"Debian DSA-1332-1 : vlc - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several remote vulnerabilities have been discovered in the VideoLan\nmultimedia player and streamer, which may lead to the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2007-3316\n David Thiel discovered that several format string\n vulnerabilities may lead to the execution of arbitrary\n code.\n\n - CVE-2007-3467\n David Thiel discovered an integer overflow in the WAV\n processing code.\n\nThis update also fixes several crashes, which can be triggered through\nmalformed media files.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429726\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-3316\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-3467\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2007/dsa-1332\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the vlc packages.\n\nFor the oldstable distribution (sarge) these problems have been fixed\nin version 0.8.1.svn20050314-1sarge3. Packages for the powerpc\narchitecture are not yet available. They will be provided later.\n\nFor the stable distribution (etch) these problems have been fixed in\nversion 0.8.6-svn20061012.debian-5etch1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:vlc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/07/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/07/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"gnome-vlc\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"gvlc\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"kvlc\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libvlc0-dev\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"mozilla-plugin-vlc\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qvlc\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-alsa\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-esd\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-ggi\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-glide\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-gnome\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-gtk\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-plugin-alsa\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-plugin-arts\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-plugin-esd\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-plugin-ggi\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-plugin-glide\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-plugin-sdl\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-plugin-svgalib\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-qt\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"vlc-sdl\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"wxvlc\", reference:\"0.8.1.svn20050314-1sarge3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libvlc0\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libvlc0-dev\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"mozilla-plugin-vlc\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"vlc\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"vlc-nox\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"vlc-plugin-alsa\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"vlc-plugin-arts\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"vlc-plugin-esd\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"vlc-plugin-ggi\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"vlc-plugin-glide\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"vlc-plugin-sdl\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"vlc-plugin-svgalib\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"wxvlc\", reference:\"0.8.6-svn20061012.debian-5etch1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:26", "bulletinFamily": "software", "cvelist": ["CVE-2007-3467", "CVE-2007-3316"], "description": "Format string vulnerabilities in Ogg Vorbis and Ogg Theora comments parsing, CDDA data, SAP/SDP discovery service. Integer overflow and uninitialized variables on WAV parsing.", "edition": 1, "modified": "2007-06-22T00:00:00", "published": "2007-06-22T00:00:00", "id": "SECURITYVULNS:VULN:7839", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:7839", "title": "VLC media player multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:34", "bulletinFamily": "unix", "cvelist": ["CVE-2007-3467", "CVE-2007-3316", "CVE-2007-3468"], "description": "\nisecpartners reports:\n\nVLC is vulnerable to a format string attack in the parsing\n\t of Vorbis comments in Ogg Vorbis and Ogg Theora files, CDDA\n\t data or SAP/SDP service discovery messages. Additionally,\n\t there are two errors in the handling of wav files, one a\n\t denial of service due to an uninitialized variable, and one\n\t integer overflow in sampling frequency calculations.\n\n", "edition": 4, "modified": "2010-05-12T00:00:00", "published": "2007-06-05T00:00:00", "id": "7128FB45-2633-11DC-94DA-0016179B2DD5", "href": "https://vuxml.freebsd.org/freebsd/7128fb45-2633-11dc-94da-0016179b2dd5.html", "title": "vlc -- format string vulnerability and integer overflow", "type": "freebsd", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-11-11T13:12:44", "bulletinFamily": "unix", "cvelist": ["CVE-2007-3467", "CVE-2007-3316", "CVE-2007-3468"], "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1332-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJuly 9th, 2007 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : vlc\nVulnerability : several\nProblem-Type : local(remote)\nDebian-specific: no\nCVE ID : CVE-2007-3316 CVE-2007-3467 CVE-2007-3468\nDebian Bug : 429726\n\nSeveral remote vulnerabilities have been discovered in the VideoLan\nmultimedia player and streamer, which may lead to the execution of\narbitrary code. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2007-3316\n\n David Thiel discovered that several format string vulnerabilities may\n lead to the execution of arbitrary code.\n\nCVE-2007-3467\n\n David Thiel discovered an integer overflow in the WAV processing code.\n\nThis update also fixes several crashes, which can be triggered through\nmalformed media files.\n\nFor the oldstable distribution (sarge) these problems have been fixed in\nversion 0.8.1.svn20050314-1sarge3. Packages for the powerpc architecture\nare not yet available. They will be provided later.\n\nFor the stable distribution (etch) these problems have been fixed\nin version 0.8.6-svn20061012.debian-5etch1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 0.8.6.c-1.\n\nWe recommend that you upgrade your vlc packages.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3.dsc\n Size/MD5 checksum: 1916 5902b04c1e1b526a1bc5817e70daa34e\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3.diff.gz\n Size/MD5 checksum: 3877 0c881ec5261a7c670ab35e2068b3a4b3\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314.orig.tar.gz\n Size/MD5 checksum: 9746520 51ecfbb072315eacf7fcaf250c26f5cb\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 1266 c97e0ef4d0e4ffab33dd49fa00cfb6f6\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 1270 2723832affc547c6f9533941979dface\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 978 41aa26035d17393ebddded4ec9bbafba\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 1107670 dfe52a09ab52d4fbb6af05263d3d07c1\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 731038 3c3ceaa428e463788d1d4aaacc752952\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 962 5bcc28afe76104000c961fe090ec6b0e\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 6380566 da8451074a3b371dce8e1e3146c327a4\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 874 4434d66f703614ff39997a138fcf4c8c\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 874 32fff6c9cf1716afebba6cfc0f6355c6\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 876 6786e61a9e095a6af1edfac03446bc02\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 872 aa20fc9e851d249b81375491e63e7709\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 866 60722e21cd8ad0da49c1d345d6d324c3\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 11116 c20712516c2efdca21698ea3d0a120c4\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 4412 8e18eff81ab31fb1d0f1741ce403fcb1\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 4540 383e24fb56afe50c289ca3ea7a98dc79\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 7280 608fa47c69852ffc7709e59a962dd83a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 12672 4916ed091fac9fc4abc7e78de3eba6d5\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 858 2aa448d1e7de4d97928ca062791a6d97\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 876 4da392405ae9dd81bc59c0e7d76c32af\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_alpha.deb\n Size/MD5 checksum: 370184 82f8e4c57f5eb037ad790c550a298367\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 1262 8763aeefbbce014ff0455895040d4bfb\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 1272 b350c63712cc56bd53410e2ed1a12251\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 980 0ea422b2a50d9792afc65b1b7c8d0ec9\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 720682 32487914e833ac2c838ebdcdecaab9f9\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 568008 1abe3c7f06ac2998b4915b5d5499a295\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 964 6158a88fc57b672e70ea30368c7eff0d\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 5293100 916a87556985f837d6b8bdb4d784e4ce\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 878 9db925481e98cd18a732697dd37af4c1\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 874 5d8d077ada95daf9d2e2d8453667ab32\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 876 e6099f23f435f14410240ee7214007c9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 874 a978693e03ef49d2a256f766e1d3e430\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 866 c86a5504f99c6beb01170785d1047fde\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 9594 e87d628788b2508fb6be40ea653c4b05\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 4014 f879d1cc971d660789e6db0f7814aae8\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 4026 3a02c76092f04dbd2670c2c341116727\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 6072 2f3d2d29bd71759321cb9c7c948be33c\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 10746 86cded7ec551f09de32e0a3fdcc1a85a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 862 2606d03801c295f093c5e57f2fd52980\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 882 19659e9a3723a3e27f40aff87673ae40\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_amd64.deb\n Size/MD5 checksum: 319104 12dbb89f0e38499ce703aeb860eb27ff\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 1266 0be7e24601d6b92ad0fb0921eec2db26\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 1274 8f30e63fffb311a77924da98d2f091e9\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 982 8318b7c26fef15f45fbf59a376313ca0\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 759010 8fac07ed73961e953074c651ea57066c\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 570614 782ddb3cd63c2d5094f15ed307a2871f\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 966 e3e51031eddf178be383defd9f33c912\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 5531258 4d2dbf6b8f27f93244d580babbbe3a6f\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 878 ecb5ef6409e332681eb1b50b7f08e86e\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 878 26f01c2d182ab97753b2b3b5375c2498\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 876 fbead6980fb1433e65534ea71a3fe94c\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 874 760d3e18614563000de84352e76af709\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 868 c526bc37bf2b2432b6ebe66f2f5a701a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 11230 8c798c0d4f844628a74ce80c4a5430cf\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 5040 1179978b2579186d30b743a758cafa8f\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 5764 c20299c4101b8cc464d5cd44c5a2c463\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 7120 51e63e8c92c8748ea925182c71c6d3b6\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 11348 04569b81dead87b385b4d3dadefdf7c7\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 862 a38a21689970856e16b078cd6bbd7133\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 882 32f15c03db8745b769bbb1683c85cf31\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_arm.deb\n Size/MD5 checksum: 367480 d919b6d193035d95b508fc629a300ed0\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 1272 259dcf2adcbb0583813190ad5ba0b58f\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 1276 b3edd4fde9996397a179995c49dd410e\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 982 3b780176da7937f233c66bc3b65a1ab0\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 923162 f4a27c99f1e9a5f5d0f5a4771fd5394a\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 702490 185188ea72bb3d4119d6017fa7d28e71\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 966 a4e0dcd9a0555f0a2a111bb2f7d7641a\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 6202138 46e5373ef4b4a417ea6df5a875d53af9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 874 e53c3663ec5bf19a7365078985ac73d4\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 872 2360e7688331b5bd06f64ba1b9d6150f\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 876 e81c165d2961b4770c36de173a870395\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 872 d927bae0394fc5b76c8f4415b684011a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 864 55f75cd3479eb48d4cfa9fef0b8538b0\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 14436 6dfab0ce6749496bb219f45a93be0768\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 6356 2ea0ea71ee1369f38beadd70bd9951b9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 7158 a29266a8cefc24cda2d43c5c20ef53ba\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 9130 5f6f0499095f964ce958e0afa50d8f97\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 14972 16adf6b0a07a1dd7ff14bab4c0df52ba\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 860 4932c16693a92e74a043d6dd805d6074\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 878 8ee3287ea0010272bdec6aab35b29ec8\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_hppa.deb\n Size/MD5 checksum: 507472 ab4b594e867d3f98d659b0224cb3c1c6\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 1266 f36ad7b97dc9009b1860e6933634d84a\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 1270 cedc5bb40e56d3ab2a67775730335885\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 974 4c4ec5557139c28341c8ea7c307fee55\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 736546 fbce776d067f9c7c44479d7613169b23\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 582404 22c0dd3f865f8cb6b5033d1eb5fccc55\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 962 808716d59e2a962c1fe39992178886cc\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 5248706 e469192f315a024ef1d5f7ea8fbb17ce\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 874 1d2cfec3d34a277e797f2cbae71bdf82\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 874 18a7414979e45f307d69e56c148b6f6e\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 876 d949314bc1b63b771abbb5d77751c989\n http://security.debian.org/pool/updates/main/v/vlc/vlc-glide_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 878 12e0f9d1a1e0510c78a43cc23d4f133b\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 874 d4e1708e97bff2da33e8a5e16486c12b\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 866 97338ecea63d9de8d1f6eba834b3921e\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 10476 eac10b6ca4426e778c67a9c6d2f9b80a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 4422 413d8a7978830fc2393037a4c61a5997\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 4666 46c8c84550748386e1986a81a2cbc053\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 6394 f2a51c5a740904f6033a10e120a86fae\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-glide_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 4670 46d191653b8a18d4ce5470180eb09ff9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 10590 a215ef7fa994cb7c2c62605e6e993e00\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-svgalib_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 4760 ff9641f1ed96fd04d35dd67987f5560c\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 862 62374cc455429e596e6a841a81073cfc\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 880 ed943da06bea3318189df46fa6a7cb67\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_i386.deb\n Size/MD5 checksum: 302670 190fe495c41bcb7ccf218c8691d0228a\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 1264 4f8151f60a4570aae3f56cabe5b9e1fd\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 1270 845daf050acdf280db37abd3aa098ac0\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 976 14d94d4b3e61efcd81b159d45c976771\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 1188538 663d6972ba29e166fe98f6ca1d6f7d82\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 947848 39699c18935bb3143d71e016e4dbc49e\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 960 b501ecf033fd1d05e4195717e45cc4d7\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 7700006 3df2e3cbcf87b1cb9ec1aac1192913cb\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 874 1ad2312b491ada1a0322b3c41a6dfd7a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 874 f34832c15728c812b6ab21c99c0d1fae\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 874 fbbed630b9b3b5a430e48d6282e556f1\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 874 1b4176d6b9d2776b5f1a0eed154e7cc7\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 864 dcc5146c80499cbca505db8eab32b399\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 14380 e296d6213154246e1474128a877aa15d\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 5340 02b3ad56f90c06aa79369f8c77a43a22\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 5470 48093cbc00c9286f285b5868c0dd3b10\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 9160 d25696df9df3ca9edde4029b5af1feff\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 16302 e50a112f1f4ce18a748d5f85d98e2524\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 862 95c228b40c765eaad44e5e23407ef9f9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 878 e8e1ba6df16672a5fb016f959baf1c17\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_ia64.deb\n Size/MD5 checksum: 485882 93f4b901f5f008b075b1978955512f2c\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 1274 e78d2c974b894f6a23e9f3b600fc128e\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 1278 daa95dec0577afa8b40bcc084b328af8\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 982 b1e9768840c6b2697065bfc2606a74b9\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 604968 01ca043bcdc7d9414d290148a0027c55\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 504128 b14f4243bff562bdbd8bd9cd68ed7602\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 964 3625e3f0090deffd367aebd7efd2e473\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 4893522 929bf6b0031c588e75092c4b6b1868ed\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 878 36d4c8f05837881d7451b9d306640359\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 876 ee3ca705878b9294fa47f2d8049dffb1\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 876 9718d073793cbb0efb9f217eb10f1863\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 876 d32eb5bc1e5d4a4d672635f16d7d540d\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 870 8d18d5fe589904b42a482540bc491abb\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 9510 45f559c15370578bb6988c506d0f195c\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 4038 f38660b5d78cd80a6f6c2e9e6d0d9b9a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 4328 6e61ddfd0e82ff33152a7c8a5dc7f6b5\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 5848 25241750410b51fde40ed3ced89697f1\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 9786 cddaefcd44f2af0a349283b7f948b5ec\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 866 c3d8c7ad6cf3e4cce8dbd5b6060f74c0\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 882 9fcfc2d9567acc524f1e6610b8b6a2a6\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_m68k.deb\n Size/MD5 checksum: 355284 f034f00756e34b0ce88f25225c075602\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 1266 7b398b96271df18a747015006b0824c1\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 1272 5035b51d8dfa0ac8f7afdccfbb1cf950\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 980 4283f204a69ad0870468003eebb6d245\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 825872 70b19cde03d565f8e93ad9f3e903fb0d\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 616244 1cc2a73fbeeeef1abea2bdbca4689808\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 966 511d06ff94613708a11d777c6d19b64a\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 5700082 ae0f65642ffd61c5a29b4cb954243c83\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 876 a0492f9b67fa835431b49539fdcdd14e\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 874 b03270fdd5a5a342a7ae341c638abf31\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 876 dbc69a9fccefb3616140ed5be724ff75\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 872 5c55ca0ad962142dc79128efa837d780\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 862 79cfd5f260a665af57e97032a078b80e\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 11116 c23192419d44d3bf50158391d6327122\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 5058 ddee3d8169764b2ca6dca36cbaa26db1\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 5776 d92b3709a4cef212b847048eb3735fff\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 7286 d9eb0ed066cabaf2a4ffb99263693579\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 12242 522b1ce796f923cfee5a92fb759c6308\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 862 d070194a19b16c07340840046c74382e\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 880 a8006790e61f9392e2b595f6a77b60c0\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_mips.deb\n Size/MD5 checksum: 293076 a38bd0777b95db258322e0d205700764\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 1270 fead125d90c9a1440e17559b83890585\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 1272 d1279e955095a0f05da90536acc96bb6\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 982 aaed0ef9a73d31ecab6835b0cd1ad1e0\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 703306 1514c9fd173c20da0d7afc2090c70a8b\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 558800 6b28ff7ad32c140b94cf902bc20067c4\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 966 cddb046dc54bacde2469c70abb6cdd38\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 5452608 4319d96149ba477c8538c6765bf05898\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 878 c7c5b13df5559b289ba7506df21cd2af\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 876 9e63edf8687147721bbaef4ed86ef623\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 874 3ce46cd0e2289c90b1e6e4179aa87560\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 872 5b680df14edacad7520008e3af8bdca1\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 866 697d4283e357b0bf7d220db4a2cc66de\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 10212 cf88754ba888df3b64de6e8b46d81bc7\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 5066 0c1bc599e731d8ebccb21d2d3138dd59\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 5766 db774eb5f9c79db9320e92da956363c3\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 6928 1c0b65b8fb8e385f56e4b6cc7feb0511\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 10880 4504ac720d5f787101cfdcd8698cb23e\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 862 0546def489c320034da7a073a864253d\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 880 09c74a561613150b5931412b2a80003f\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_mipsel.deb\n Size/MD5 checksum: 239178 00a170274ea4f6c367fc256dbfde2296\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 1266 376c42a1794d2cd79c6b8e024698b5b3\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 1272 f784fe8d29b7aac5a7d5be4c7438d2cf\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 978 747f651d4614cf6acff80e18b3b58b9a\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 761808 645cffd54e06257377cae0b618dc754b\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 600560 dca7ca3ca19b5b65a0194693cd7b8079\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 962 e73c185034fcbadcde10d9eb2b9be02f\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 5390348 c53b77662aeb9e6a7a408af1f6726675\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 874 2e8aaf58b00a4293e33b79bc6e02e73b\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 876 ec46af7b9904a871fe3c1b61f578a519\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 876 3007bcd236092441e4a3995988fe99b9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 872 9c9bd61e4500ef070943655ce184d6e7\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 866 dcd95c8e942b701b7ea839d729c42282\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 12076 47c51cf42023c4761df9938af9914821\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 5322 8eef2225c34a0a2e4cbe6595fe4ad21b\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 6078 dd5002abe19334c6f6635ea2c418f00c\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 7792 f394cd2d7c8db71cf70bded86a68179f\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 12222 6ac135c2bf07979d269e1e63a9b9edae\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 862 8197bd362e6c929208d885ee32398537\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 882 efb00bc1f782e0e07de1c004f89cacc2\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_s390.deb\n Size/MD5 checksum: 317294 1f755cc92fd55e5e91afadd3cf23cb7c\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/gnome-vlc_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 1270 d8d2e4c05478cc1e1fe9251961b7c0bd\n http://security.debian.org/pool/updates/main/v/vlc/gvlc_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 1276 d225849ca8ab8640db1a3193ece66e50\n http://security.debian.org/pool/updates/main/v/vlc/kvlc_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 980 74cbc5c6674b25241eec5a52941501fd\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 787426 b54c4affd75919383c5e8a902707e5fc\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 629160 0472d344f5fe39ee6d96852a476f563b\n http://security.debian.org/pool/updates/main/v/vlc/qvlc_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 964 9e744b5d74a7671f80ee3d44a3f5cb3a\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 5694532 44b59172072cb0b0d712a5b3c141107b\n http://security.debian.org/pool/updates/main/v/vlc/vlc-alsa_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 876 0f2457a04ed702575e16cfeefe7f3745\n http://security.debian.org/pool/updates/main/v/vlc/vlc-esd_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 876 472bc30a070c33c173769be08a58527f\n http://security.debian.org/pool/updates/main/v/vlc/vlc-ggi_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 876 52dabfce9d647a0d15aa98cf2f5565d9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gnome_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 874 43ae2447888094d17c9e5e0429512b54\n http://security.debian.org/pool/updates/main/v/vlc/vlc-gtk_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 866 74411c20f5038a3aabad34871b3dc26d\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 11432 6bd07b1c2f37ac0527b9675aeea21b66\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 4726 ca76faf39a5c32acbeb5187ace231351\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 5168 d512b9a16cbe49fc3ea71f12aa670e99\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 6848 f4f374ad225d501f22095bdf3200f063\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 11760 65281d7c97082cf7859a8c6bef586bed\n http://security.debian.org/pool/updates/main/v/vlc/vlc-qt_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 862 426d80a017cc5249ffd51bbd63f6ed85\n http://security.debian.org/pool/updates/main/v/vlc/vlc-sdl_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 880 a47d1b12e20f73a3455226e792beed2f\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.1.svn20050314-1sarge3_sparc.deb\n Size/MD5 checksum: 324892 e8206e1554f5f541d25e1666e529f765\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1.dsc\n Size/MD5 checksum: 2608 a78b0e31b43f1d6519485222254c8591\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1.diff.gz\n Size/MD5 checksum: 2376828 d3465014c27a536eb1e0e055e381e378\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian.orig.tar.gz\n Size/MD5 checksum: 15168393 30c18a2fdc4105606033ff6e6aeab81c\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-alsa_0.8.6-svn20061012.debian-5etch1_all.deb\n Size/MD5 checksum: 782 0100725dbe353382fae899953a44bd90\n http://security.debian.org/pool/updates/main/v/vlc/wxvlc_0.8.6-svn20061012.debian-5etch1_all.deb\n Size/MD5 checksum: 774 5e3b682a006ae7aab3a2c762e7c3f5e5\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_alpha.deb\n Size/MD5 checksum: 1157268 cb75c7bd6898c5e1a7c29ee3a9e61500\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_alpha.deb\n Size/MD5 checksum: 19982 3a87ce78b88d05c1996a760a4f7d3a8d\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_alpha.deb\n Size/MD5 checksum: 40318 86f50b927e3a736b70a3fdb6d83ba1db\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_alpha.deb\n Size/MD5 checksum: 1307408 c6c179facf7e55373bb18ed60dfb3c41\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_alpha.deb\n Size/MD5 checksum: 5177170 49ab85ceaa213062f3fc9ccc8017f33a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_alpha.deb\n Size/MD5 checksum: 4436 cc9c719942e4f60c2e0ee517f7e4e533\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_alpha.deb\n Size/MD5 checksum: 5018 49a3b7c68cc5127339d31c912909d17a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_alpha.deb\n Size/MD5 checksum: 6934 9910ccada8a24c036eca824e782c1d2a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_alpha.deb\n Size/MD5 checksum: 13046 9bf69621f2415495d95952d6e1eddf3e\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_amd64.deb\n Size/MD5 checksum: 950714 67fe1a4fd9febe70f4837cf3b3fe683c\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_amd64.deb\n Size/MD5 checksum: 20186 47d5be6dfde55e64816b7ba44f3148f0\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_amd64.deb\n Size/MD5 checksum: 36764 4465d9e4759ddf3910cf3b740c48ece6\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_amd64.deb\n Size/MD5 checksum: 1144148 6c3b42eb4bc188084646b2dda1f0a3cb\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_amd64.deb\n Size/MD5 checksum: 4665880 eec4e9f38ef6752435fc87a9c105e56f\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_amd64.deb\n Size/MD5 checksum: 4182 9563f659ad6e778bfbc56b57f13e7b57\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_amd64.deb\n Size/MD5 checksum: 4518 00b6020312930574b935d7af50dfaf08\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_amd64.deb\n Size/MD5 checksum: 6050 7e7d6d659b9b5be3b625cee14cfb47be\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_amd64.deb\n Size/MD5 checksum: 11332 0a050da2f3d917bd4dca1bc6bd0e8dab\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_arm.deb\n Size/MD5 checksum: 997626 4256d6ea81bc252f4ef9f10222bc8cd2\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_arm.deb\n Size/MD5 checksum: 20148 45793cf77d0e9578718258d0cfd1dcf6\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_arm.deb\n Size/MD5 checksum: 33324 f875c930d7a2ed700ee2998adfbac079\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_arm.deb\n Size/MD5 checksum: 1262862 19a36c98ee4261cc042fd274cd22eb40\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_arm.deb\n Size/MD5 checksum: 4708758 06d13665f0edadaa3de5b91713a31d5d\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_arm.deb\n Size/MD5 checksum: 4206 fbef73f8c1da91dfd0ff5622b13efa52\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_arm.deb\n Size/MD5 checksum: 5586 3285d3ba1e755c76fc7f3d67686b1b52\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_arm.deb\n Size/MD5 checksum: 6100 8de5caaee8e7e469463c72515f2b400e\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_arm.deb\n Size/MD5 checksum: 10798 b9bf9cee812dd98f67faf5390585d3ef\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_hppa.deb\n Size/MD5 checksum: 1084028 2fdece0961c4df34ff5502995dd03dc5\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_hppa.deb\n Size/MD5 checksum: 20142 f203ca073aaa00f9f9c9ff8448697f3f\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_hppa.deb\n Size/MD5 checksum: 46660 72f35b40873df9f6f9492448d3e4e42d\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_hppa.deb\n Size/MD5 checksum: 1377756 bddc949bb00e608fa3d175bc0ecfd6d2\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_hppa.deb\n Size/MD5 checksum: 5214598 1c3da50dd630fb3a52db33c7a94b4c68\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_hppa.deb\n Size/MD5 checksum: 5356 48515d73865833a1eb80339b103ec088\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_hppa.deb\n Size/MD5 checksum: 6956 3e7963b97dfc4d40c7aa1ce5b421d6e4\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_hppa.deb\n Size/MD5 checksum: 7792 4a55e4b6b899b134397002d5a98d2cd0\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_hppa.deb\n Size/MD5 checksum: 13744 e3aa0eec49a6747ea0f7bd2ee363cba3\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 957680 a480bbcf93fd8b5661cf103326d447b5\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 20192 953afed452ce74818b60fe123e6b39cc\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 36182 72db66b31b1105b5e30ccbfb11be1293\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 1137646 3ea8114ac3cef6a979c0444afad72331\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 4628428 325759b017bc105ebc8121d4f51f77f5\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 4104 847a4204b2a8e03e9ffb495ddbe09f74\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 4816 eee461e1a79b5b509dd0e3fe8d87d358\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 5838 9e9b6a49d9c311ac9062752744df9953\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-glide_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 4134 2806e46188b5d3a86996b66adac01d19\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 10712 9f2d3b61e96095f5ea07d7541b281149\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-svgalib_0.8.6-svn20061012.debian-5etch1_i386.deb\n Size/MD5 checksum: 4532 044d220ad46949a671788d2ef6112cdc\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_ia64.deb\n Size/MD5 checksum: 1459010 b6a4d12d35166cc497588f0ed9f5cdb2\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_ia64.deb\n Size/MD5 checksum: 20130 bc76e77f4c0d0f25744a8471d445f67f\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_ia64.deb\n Size/MD5 checksum: 49106 97771c13cf113228ba07e05a51bceea8\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_ia64.deb\n Size/MD5 checksum: 1568902 4ae7ac2ee4b6685fa1f4f62c61cfd8ad\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_ia64.deb\n Size/MD5 checksum: 5904752 4da9afaf2946d94cf535f1d82addfec9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_ia64.deb\n Size/MD5 checksum: 5440 a43ff3008db86c97bc4461d7201c04cf\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_ia64.deb\n Size/MD5 checksum: 6202 009be900fbf87fd882fde02814dcfff4\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_ia64.deb\n Size/MD5 checksum: 9094 676e79bdeebcd3d6963cf15226c428ff\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_ia64.deb\n Size/MD5 checksum: 17186 f2f20ea4a328a9469d928aedd6faa227\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_mips.deb\n Size/MD5 checksum: 1004622 0ad7e56ada72dea642205a68683e015c\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_mips.deb\n Size/MD5 checksum: 20140 e9aaf465ed450806c8f8d5129f37145e\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_mips.deb\n Size/MD5 checksum: 35558 fa9e32aaa5544de3621ac9ed7d756af0\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_mips.deb\n Size/MD5 checksum: 1113292 6dc1dd1684cfc8e09625750a918017a9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_mips.deb\n Size/MD5 checksum: 4974130 64deccffcb018379cd64e3a2fbe76018\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_mips.deb\n Size/MD5 checksum: 4490 312f1b533628b6447eaf4718972000fe\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_mips.deb\n Size/MD5 checksum: 5960 c8bf0b5549046c7906b8d27ced8cddb5\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_mips.deb\n Size/MD5 checksum: 6844 448f47d416f6019a1e9a7114c52ff626\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_mips.deb\n Size/MD5 checksum: 12260 81d5e15b159e9cfc534902f2c3c545f1\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_mipsel.deb\n Size/MD5 checksum: 922240 b573661615fd9547a392d888762e05cb\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_mipsel.deb\n Size/MD5 checksum: 20128 5886bf330518feea79b7404f6300685f\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_mipsel.deb\n Size/MD5 checksum: 34618 22262edb4222b71c3824d59ffd66901d\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_mipsel.deb\n Size/MD5 checksum: 1005624 3987cd7702568c21d5e544f252761c92\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_mipsel.deb\n Size/MD5 checksum: 4667764 93d91045f85358cfccbc3e1f51e59637\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_mipsel.deb\n Size/MD5 checksum: 4478 fd76541711474a24aa4578469470be4a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_mipsel.deb\n Size/MD5 checksum: 5914 36523e7dc76fa2a119fb562cf5a617ac\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_mipsel.deb\n Size/MD5 checksum: 6714 59a91edcc1cced24ddf9326df3fdccb1\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_mipsel.deb\n Size/MD5 checksum: 11946 5ceca5161c9028a0c55fa2336ab4e1ec\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_powerpc.deb\n Size/MD5 checksum: 1020454 59c04a1406847141de4a0dd7f7399c9e\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_powerpc.deb\n Size/MD5 checksum: 20182 7096bbe06024d6dfea242a1c0b32749f\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_powerpc.deb\n Size/MD5 checksum: 38230 20715fe1014f9ae66c9cc2df7d91d217\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_powerpc.deb\n Size/MD5 checksum: 1188888 1de2edea212a0662902bd423c4e5785f\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_powerpc.deb\n Size/MD5 checksum: 5099300 10de270be39d22253aebd5675d23aacd\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_powerpc.deb\n Size/MD5 checksum: 5618 76e60bf5884465d5509804f6f3a58f91\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_powerpc.deb\n Size/MD5 checksum: 6904 1e8632d4c4f0648c65eaac9d9bcfcb3b\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_powerpc.deb\n Size/MD5 checksum: 7976 9075958a8fd8aa3b4ceea87f0fabb8cb\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_powerpc.deb\n Size/MD5 checksum: 13668 d15789e9408ca271f7e63015052a5d65\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_s390.deb\n Size/MD5 checksum: 1018924 f108d205fc73d7e3af5766572278b43d\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_s390.deb\n Size/MD5 checksum: 20124 8164d06c0651d5c56c483ee3bf88e95e\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_s390.deb\n Size/MD5 checksum: 38334 91b8b761b4397a6fb28480736038c04d\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_s390.deb\n Size/MD5 checksum: 1172950 654c78843141de8c21f8e69aa2a3c2c8\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_s390.deb\n Size/MD5 checksum: 4860280 3e853b78670dcfe9518328eb91cd2928\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_s390.deb\n Size/MD5 checksum: 4300 3cb45db33b5fd20d048b6ed1b28349ac\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_s390.deb\n Size/MD5 checksum: 6048 7fd234f15b4f60c9ff535e9a455b4a9a\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_s390.deb\n Size/MD5 checksum: 6322 d60477904417d9456106811495f00dae\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_s390.deb\n Size/MD5 checksum: 11410 9b6b14dd870924a9e94f47171df5f65c\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0_0.8.6-svn20061012.debian-5etch1_sparc.deb\n Size/MD5 checksum: 950106 86217f02f68b3a081a9b3547b37c0ded\n http://security.debian.org/pool/updates/main/v/vlc/libvlc0-dev_0.8.6-svn20061012.debian-5etch1_sparc.deb\n Size/MD5 checksum: 20142 ee919af971dd8131596e65c6e3b9fcc7\n http://security.debian.org/pool/updates/main/v/vlc/mozilla-plugin-vlc_0.8.6-svn20061012.debian-5etch1_sparc.deb\n Size/MD5 checksum: 33298 43ef207a0da153fa06bf56d1932ebb44\n http://security.debian.org/pool/updates/main/v/vlc/vlc_0.8.6-svn20061012.debian-5etch1_sparc.deb\n Size/MD5 checksum: 1189596 1ecf5dcf4bbd9d139982222c6da6151b\n http://security.debian.org/pool/updates/main/v/vlc/vlc-nox_0.8.6-svn20061012.debian-5etch1_sparc.deb\n Size/MD5 checksum: 4660592 2bd4a1c1c9c504a9b26707a646263976\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-arts_0.8.6-svn20061012.debian-5etch1_sparc.deb\n Size/MD5 checksum: 3920 1988d8d1cf4ca4f5dba735a7a6004509\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-esd_0.8.6-svn20061012.debian-5etch1_sparc.deb\n Size/MD5 checksum: 4750 e8731150503e0129173e05d176c682a9\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-ggi_0.8.6-svn20061012.debian-5etch1_sparc.deb\n Size/MD5 checksum: 5752 0ded73c2660dbbbb9a16ed6b43bf1150\n http://security.debian.org/pool/updates/main/v/vlc/vlc-plugin-sdl_0.8.6-svn20061012.debian-5etch1_sparc.deb\n Size/MD5 checksum: 10400 b09c8987d85bd7be84648e1371c115b4\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 3, "modified": "2007-07-09T00:00:00", "published": "2007-07-09T00:00:00", "id": "DEBIAN:DSA-1332-1:B084C", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00093.html", "title": "[SECURITY] [DSA 1332-1] New vlc packages fix arbitrary code execution", "type": "debian", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}