summaryrefslogtreecommitdiff
blob: 6bb40160bab95e3ce34f13c998270bad6fbb2d47 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200404-20">
  <title>Multiple vulnerabilities in xine</title>
  <synopsis>
    Several vulnerabilities have been found in xine-ui and xine-lib,
    potentially allowing an attacker to overwrite files with the rights of the
    user.
  </synopsis>
  <product type="ebuild">xine</product>
  <announced>2004-04-27</announced>
  <revised count="02">2006-05-22</revised>
  <bug>45448</bug>
  <bug>48107</bug>
  <bug>48108</bug>
  <access>remote</access>
  <affected>
    <package name="media-video/xine-ui" auto="yes" arch="*">
      <unaffected range="ge">0.9.23-r2</unaffected>
      <vulnerable range="le">0.9.23-r1</vulnerable>
    </package>
    <package name="media-libs/xine-lib" auto="yes" arch="*">
      <unaffected range="ge">1_rc3-r3</unaffected>
      <vulnerable range="le">1_rc3-r2</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    xine is a multimedia player allowing to play back CDs, DVDs, and VCDs
    and decoding multimedia files like AVI, MOV, WMV, and MP3 from local
    disk drives, and displays multimedia streamed over the Internet. It is
    available in Gentoo as a reusable library (xine-lib) with a standard
    user interface (xine-ui).
    </p>
  </background>
  <description>
    <p>
    Several vulnerabilities were found in xine-ui and xine-lib. By opening
    a malicious MRL in any xine-lib based media player, an attacker can
    write arbitrary content to an arbitrary file, only restricted by the
    permissions of the user running the application. By opening a malicious
    playlist in the xine-ui media player, an attacker can write arbitrary
    content to an arbitrary file, only restricted by the permissions of the
    user running xine-ui. Finally, a temporary file is created in an
    insecure manner by the xine-check and xine-bugreport scripts,
    potentially allowing a local attacker to use a symlink attack.
    </p>
  </description>
  <impact type="normal">
    <p>
    These three vulnerabilities may alow an attacker to corrupt system
    files, thus potentially leading to a Denial of Service. It is also
    theoretically possible, though very unlikely, to use these
    vulnerabilities to elevate the privileges of the attacker.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time. All users are advised to
    upgrade to the latest available versions of xine-ui and xine-lib.
    </p>
  </workaround>
  <resolution>
    <p>
    All users of xine-ui or another xine-based player should upgrade to the
    latest stable versions:
    </p>
    <code>
    # emerge sync
    
    # emerge -pv "&gt;=media-video/xine-ui-0.9.23-r2"
    # emerge "&gt;=media-video/xine-ui-0.9.23-r2"
    
    # emerge -pv "&gt;=media-libs/xine-lib-1_rc3-r3"
    # emerge "&gt;=media-libs/xine-lib-1_rc3-r3"</code>
  </resolution>
  <references>
    <uri link="http://xinehq.de/index.php/security">Xine Security Advisories</uri>
    <uri link="http://nettwerked.mg2.org/advisories/xinebug">xine-bugreport and xine-check vulnerability</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0372">CVE-2004-0372</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1951">CVE-2004-1951</uri>
  </references>
  <metadata tag="submitter">
    koon
  </metadata>
</glsa>