Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2008-0225

Published: 10 January 2008

Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute in an RTSP session, related to the rmff_dump_header function and related to disregarding the max field. NOTE: some of these details are obtained from third party information.

Priority

Medium

Status

Package Release Status
mplayer
Launchpad, Ubuntu, Debian
dapper
Released (2:0.99+1.0pre7try2+cvs20060117-0ubuntu8.2)
edgy
Released (2:0.99+1.0pre8-0ubuntu8.3)
feisty
Released (2:1.0~rc1-0ubuntu9.3)
gutsy
Released (2:1.0~rc1-0ubuntu13.2)
hardy Not vulnerable

upstream Not vulnerable

Patches:
vendor: http://www.debian.org/security/2008/dsa-1496


xine-lib
Launchpad, Ubuntu, Debian
dapper
Released (1.1.1+ubuntu2-7.9)
edgy Ignored
(end of life, was needed)
feisty
Released (1.1.4-2ubuntu3.1)
gutsy
Released (1.1.7-1ubuntu1.3)
hardy Not vulnerable
(1.1.11.1-1ubuntu3)
upstream
Released (1.1.9.1)
Patches:

vendor: http://www.debian.org/security/2008/dsa-1472
vendor: http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:020