1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-08 06:48:28 +00:00

Add an entry for libxine multiple buffer overflow vulnerabilities.

This commit is contained in:
MANTANI Nobutaka 2006-12-07 17:50:38 +00:00
parent 9594627f7e
commit bc3d9e0555
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=179132

View File

@ -34,6 +34,51 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="1b043693-8617-11db-93b2-000e35248ad7">
<topic> libxine -- multiple buffer overflow vulnerabilities</topic>
<affects>
<package>
<name>libxine</name>
<range><lt>1.1.3</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Secunia reports:</p>
<blockquote cite="http://secunia.com/advisories/23218/">
<p>
Some vulnerabilities have been reported in xine-lib, which
potentially can be exploited by malicious people to compromise
a user's system.
</p>
<p>
1) A vulnerability is caused due to a boundary error within the
"real_parse_sdp()" function in src/input/libreal/real.c. This
can be exploited to cause a buffer overflow by e.g. tricking a
user into connecting to a malicious server.
</p>
<p>
2) A buffer overflow exists in the libmms library.
For more information: <a href="http://secunia.com/SA20749/">SA20749</a>
</p>
<p>
Successful exploitation may allow the execution of arbitrary code.
</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2006-2200</cvename>
<cvename>CVE-2006-6172</cvename>
<bid>18608</bid>
<bid>21435</bid>
</references>
<dates>
<discovery>2006-05-04</discovery>
<entry>2006-12-07</entry>
</dates>
</vuln>
<vuln vid="4db1669c-8589-11db-ac4f-02e081235dab">
<topic>gnupg -- remotely controllable function pointer</topic>
<affects>