製品・ソフトウェアに関する情報
xine-lib におけるヒープベースのバッファオーバーフローの脆弱性
Title xine-lib におけるヒープベースのバッファオーバーフローの脆弱性
Summary

xine-lib は、(1) demux_qt.c の parse_moov_atom 関数が実行する巧妙に細工されたメタデータの atom サイズ、および (2) id3.c の id3v23_interp_frame 関数のフレーム読み込みに関する処理に不備があるため、ヒープベースのバッファオーバーフローの脆弱性が存在します。

Possible impacts 第三者により、任意のコードを実行される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Sept. 10, 2008, midnight
Registration Date Dec. 20, 2012, 6:52 p.m.
Last Update Dec. 20, 2012, 6:52 p.m.
CVSS2.0 : 危険
Score 9.3
Vector AV:N/AC:M/Au:N/C:C/I:C/A:C
Affected System
Xine
xine-lib 1.1.12 および 1.1.15 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年12月20日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2008-5234
Summary

Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c. NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15.

Summary

http://secunia.com/advisories/31502

1) Multiple integer overflows exist within the processing of ID3 tags in src/demuxers/id3.c. These can be exploited to cause heap-based buffer overflows via overly large ID3 frame header size fields.

2) Multiple boundary errors exist within the "demux_real_send_chunk()" function in src/demuxers/demux_real.c. These can potentially be exploited to cause heap-based buffer overflows via specially crafted Real Media files.

3) A boundary error exists within the "open_video_capture_device()" function in src/input/input_v4l.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted V4L stream.

4) A boundary error exists within the "parse_moov_atom()" function in src/demuxers/demux_qt.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted Quicktime file.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in versions prior to 1.1.15.

Summary

http://secunia.com/advisories/31502

Solution:
Update to version 1.1.15, which fixes vulnerabilities #1-#3. (as noted above).

Publication Date Nov. 26, 2008, 10:30 a.m.
Registration Date Jan. 29, 2021, 1:45 p.m.
Last Update Oct. 12, 2018, 5:54 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:* 1.1.14
cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List