mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-08 06:48:28 +00:00
Add an entry for libxine multiple buffer overflow vulnerabilities.
This commit is contained in:
parent
9594627f7e
commit
bc3d9e0555
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=179132
@ -34,6 +34,51 @@ Note: Please add new entries to the beginning of this file.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="1b043693-8617-11db-93b2-000e35248ad7">
|
||||
<topic> libxine -- multiple buffer overflow vulnerabilities</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>libxine</name>
|
||||
<range><lt>1.1.3</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Secunia reports:</p>
|
||||
<blockquote cite="http://secunia.com/advisories/23218/">
|
||||
<p>
|
||||
Some vulnerabilities have been reported in xine-lib, which
|
||||
potentially can be exploited by malicious people to compromise
|
||||
a user's system.
|
||||
</p>
|
||||
<p>
|
||||
1) A vulnerability is caused due to a boundary error within the
|
||||
"real_parse_sdp()" function in src/input/libreal/real.c. This
|
||||
can be exploited to cause a buffer overflow by e.g. tricking a
|
||||
user into connecting to a malicious server.
|
||||
</p>
|
||||
<p>
|
||||
2) A buffer overflow exists in the libmms library.
|
||||
For more information: <a href="http://secunia.com/SA20749/">SA20749</a>
|
||||
</p>
|
||||
<p>
|
||||
Successful exploitation may allow the execution of arbitrary code.
|
||||
</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2006-2200</cvename>
|
||||
<cvename>CVE-2006-6172</cvename>
|
||||
<bid>18608</bid>
|
||||
<bid>21435</bid>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2006-05-04</discovery>
|
||||
<entry>2006-12-07</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="4db1669c-8589-11db-ac4f-02e081235dab">
|
||||
<topic>gnupg -- remotely controllable function pointer</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user