int(2859)

Boletines de Vulnerabilidades


Desbordamiento de búfer en xine-lib

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Obtener acceso
Dificultad Experto
Requerimientos del atacante Acceso remoto sin cuenta a un servicio exotico

Información sobre el sistema

Propiedad Valor
Fabricante afectado GNU/Linux
Software afectado xine-lib

Descripción

Se ha descubierto una vulnerabilidad de tipo desbordamiento de búfer en xine-lib. La vulnerabilidad reside en un error en la función "asmrp_eval()" para un plugin de entrada de Real Media.

Un atacante remoto podría causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante un libro de reglas con un gran número de reglas.

Solución



Actualización de software

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libxine1-1-0.rc3.6.14.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libxine1-devel-1-0.rc3.6.14.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/xine-aa-1-0.rc3.6.14.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/xine-arts-1-0.rc3.6.14.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/xine-dxr3-1-0.rc3.6.14.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/xine-esd-1-0.rc3.6.14.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/xine-flac-1-0.rc3.6.14.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/xine-gnomevfs-1-0.rc3.6.14.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/xine-plugins-1-0.rc3.6.14.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/xine-lib-1-0.rc3.6.14.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64xine1-1-0.rc3.6.14.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64xine1-devel-1-0.rc3.6.14.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/xine-aa-1-0.rc3.6.14.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/xine-arts-1-0.rc3.6.14.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/xine-esd-1-0.rc3.6.14.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/xine-flac-1-0.rc3.6.14.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/xine-gnomevfs-1-0.rc3.6.14.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/xine-plugins-1-0.rc3.6.14.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/xine-lib-1-0.rc3.6.14.C30mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libxine1-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libxine1-devel-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-aa-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-arts-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-dxr3-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-esd-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-flac-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-gnomevfs-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-image-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-plugins-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-sdl-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/xine-smb-1.1.2-3.2mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/xine-lib-1.1.2-3.2mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64xine1-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/lib64xine1-devel-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-aa-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-arts-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-dxr3-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-esd-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-flac-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-gnomevfs-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-image-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-plugins-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-sdl-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/xine-smb-1.1.2-3.2mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/xine-lib-1.1.2-3.2mdv2007.0.src.rpm

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux

Debian

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/x/xine-lib/xine-lib_1.0.1-1sarge5.dsc
http://security.debian.org/pool/updates/main/x/xine-lib/xine-lib_1.0.1-1sarge5.diff.gz
http://security.debian.org/pool/updates/main/x/xine-lib/xine-lib_1.0.1.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_alpha.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_amd64.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_amd64.deb
ARM
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_arm.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_arm.deb
HP Precision
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_hppa.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_hppa.deb
Intel IA-32
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_i386.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_ia64.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_ia64.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_m68k.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_mips.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_mipsel.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_powerpc.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_s390.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/x/xine-lib/libxine-dev_1.0.1-1sarge5_sparc.deb
http://security.debian.org/pool/updates/main/x/xine-lib/libxine1_1.0.1-1sarge5_sparc.deb

Identificadores estándar

Propiedad Valor
CVE CVE-2006-6172
BID

Recursos adicionales

Mandriva Security Advisory (MDKSA-2006:224)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:224

SUSE Security Advisory (SUSE-SR:2006:028)
http://www.novell.com/linux/security/advisories/2006_28_sr.html

Debian Security Advisory (DSA 1244-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00346.html

Mandriva Security Advisory (MDKSA-2007:112)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:112

Histórico de versiones

Versión Comentario Fecha
1.0 Aviso emitido 2006-12-07
1.1 Aviso emitido por Suse (SUSE-SR:2006:028) 2006-12-14
1.2 Aviso emitido por Debian (DSA 1244-1) 2006-12-29
1.3 Aviso emitido por Mandriva (MDKSA-2007:112) 2007-06-06

Miembros de

Ministerio de Defensa
CNI
CCN
CCN-CERT