From a39b070264b5490b51aaed0d4ad786f673c8440d Mon Sep 17 00:00:00 2001 From: MANTANI Nobutaka Date: Sun, 11 Jun 2006 12:55:21 +0000 Subject: Add an entry for libxine -- buffer overflow vulnerability. --- security/vuxml/vuln.xml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) (limited to 'security') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 73bb6bd24e0c..24336b3c4cc1 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,39 @@ Note: Please add new entries to the beginning of this file. --> + + libxine -- buffer overflow vulnerability + + + libxine + 1.1.1_6 + + + + +

A Secunia Advisory reports:

+
+

Federico L. Bossi Bonin has discovered a weakness in xine-lib, + which can be exploited by malicious people to crash certain + applications on a user's system.

+

The weakness is cause due to a heap corruption within the + "xineplug_inp_http.so" plugin when handling an overly large + reply from the HTTP server. This can be exploited to crash + an application that uses the plugin (e.g. gxine).

+
+ +
+ + http://secunia.com/advisories/20369 + CVE-2006-2802 + 18187 + + + 2006-05-31 + 2006-06-11 + +
+ smbfs -- chroot escape -- cgit v1.2.3