NVD Vulnerability Detail
Search Exploit, PoC
CVE-2008-5234
Summary

Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c. NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15.

Summary

http://secunia.com/advisories/31502

1) Multiple integer overflows exist within the processing of ID3 tags in src/demuxers/id3.c. These can be exploited to cause heap-based buffer overflows via overly large ID3 frame header size fields.

2) Multiple boundary errors exist within the "demux_real_send_chunk()" function in src/demuxers/demux_real.c. These can potentially be exploited to cause heap-based buffer overflows via specially crafted Real Media files.

3) A boundary error exists within the "open_video_capture_device()" function in src/input/input_v4l.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted V4L stream.

4) A boundary error exists within the "parse_moov_atom()" function in src/demuxers/demux_qt.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted Quicktime file.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in versions prior to 1.1.15.

Summary

http://secunia.com/advisories/31502

Solution:
Update to version 1.1.15, which fixes vulnerabilities #1-#3. (as noted above).

Publication Date Nov. 26, 2008, 10:30 a.m.
Registration Date Jan. 29, 2021, 1:45 p.m.
Last Update Oct. 12, 2018, 5:54 a.m.
CVSS2.0 : HIGH
Score 9.3
Vector AV:N/AC:M/Au:N/C:C/I:C/A:C
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Get all privileges. はい
Get user privileges いいえ
Get other privileges いいえ
User operation required はい
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:xine:xine-lib:0.9.13:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc0a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc1:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc2:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3b:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc3c:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc4:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc4a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc5:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc6a:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc7:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1:rc8:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.0.3a:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.11.1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:*:*:*:*:*:*:*:* 1.1.14
cpe:2.3:a:xine:xine-lib:1_beta1:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta2:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta3:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta4:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta5:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta6:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta7:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta8:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta9:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta10:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta11:*:*:*:*:*:*:*
cpe:2.3:a:xine:xine-lib:1_beta12:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
xine-lib におけるヒープベースのバッファオーバーフローの脆弱性
Title xine-lib におけるヒープベースのバッファオーバーフローの脆弱性
Summary

xine-lib は、(1) demux_qt.c の parse_moov_atom 関数が実行する巧妙に細工されたメタデータの atom サイズ、および (2) id3.c の id3v23_interp_frame 関数のフレーム読み込みに関する処理に不備があるため、ヒープベースのバッファオーバーフローの脆弱性が存在します。

Possible impacts 第三者により、任意のコードを実行される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Sept. 10, 2008, midnight
Registration Date Dec. 20, 2012, 6:52 p.m.
Last Update Dec. 20, 2012, 6:52 p.m.
Affected System
Xine
xine-lib 1.1.12 および 1.1.15 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年12月20日]
  掲載
Feb. 17, 2018, 10:37 a.m.