7.2 High
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.121 Low
EPSS
Percentile
95.3%
It was discovered that the QT demuxer in xine-lib did not correctly handle
a large count value in an STTS atom, resulting in a heap-based buffer
overflow. If a user or automated system were tricked into opening a
specially crafted MOV file, an attacker could execute arbitrary code as the
user invoking the program. (CVE-2009-1274)
USN-746-1 provided updated xine-lib packages to fix multiple security
vulnerabilities. The security patch to fix CVE-2009-0698 was incomplete.
This update corrects the problem.
Original advisory details:
It was discovered that the 4xm demuxer in xine-lib did not correctly
handle a large current_track value in a 4xm file, resulting in an integer
overflow. If a user or automated system were tricked into opening a
specially crafted 4xm movie file, an attacker could crash xine-lib or
possibly execute arbitrary code with the privileges of the user invoking
the program. (CVE-2009-0698)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 8.10 | noarch | libxine1 | < 1.1.15-0ubuntu3.3 | UNKNOWN |
Ubuntu | 8.10 | noarch | libxine-dev | < 1.1.15-0ubuntu3.3 | UNKNOWN |
Ubuntu | 8.10 | noarch | libxine1-bin | < 1.1.15-0ubuntu3.3 | UNKNOWN |
Ubuntu | 8.10 | noarch | libxine1-console | < 1.1.15-0ubuntu3.3 | UNKNOWN |
Ubuntu | 8.10 | noarch | libxine1-dbg | < 1.1.15-0ubuntu3.3 | UNKNOWN |
Ubuntu | 8.10 | noarch | libxine1-ffmpeg | < 1.1.15-0ubuntu3.3 | UNKNOWN |
Ubuntu | 8.10 | noarch | libxine1-gnome | < 1.1.15-0ubuntu3.3 | UNKNOWN |
Ubuntu | 8.10 | noarch | libxine1-misc-plugins | < 1.1.15-0ubuntu3.3 | UNKNOWN |
Ubuntu | 8.10 | noarch | libxine1-x | < 1.1.15-0ubuntu3.3 | UNKNOWN |
Ubuntu | 8.04 | noarch | libxine1 | < 1.1.11.1-1ubuntu3.4 | UNKNOWN |