xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/30797 | patch vdb entry |
http://secunia.com/advisories/33544 | third party advisory |
http://www.ocert.org/analysis/2008-008/analysis.txt | |
http://securityreason.com/securityalert/4648 | third party advisory |
http://secunia.com/advisories/31827 | third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00174.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44653 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html | vendor advisory |
http://www.securityfocus.com/archive/1/495674/100/0/threaded | mailing list |
http://www.osvdb.org/47742 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:020 | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00555.html | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00385.html | vendor advisory |