[<prev] [next>] [day] [month] [year] [list]
Message-ID: <48B1FFDB.5010409@pardus.org.tr>
Date: Mon, 25 Aug 2008 03:42:03 +0300
From: Pınar Yanardağ <pinar@...dus.org.tr>
To: pardus-security@...dus.org.tr
Cc: full-disclosure@...ts.grok.org.uk
Subject: [PLSA 2008-29] Vlc: Multiple Vulnerabilities
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-29 security@...dus.org.tr
------------------------------------------------------------------------
Date: 2008-08-25
Severity: 3
Type: Remote
------------------------------------------------------------------------
Summary
=======
Multiple vulnerabilities have discovered by g_ which potentially can be
exploited by malicious people to compromise a user's system.
Description
===========
First vulnerability is caused due to an integer overflow error within the
"Open()" function in modules/demux/tta.c. This can be exploited to cause
a heap-based buffer overflow via specially crafted TTA data. Successful
exploitation may potentially allow execution of arbitrary code.
Also, a heap overflow in MMS Protocol Handling can be exploited from remote.
Affected packages:
Pardus 2008:
vlc, all before 0.8.6i-23-10
vlc-firefox, all before 0.8.6i-23-10
Resolution
==========
There are update(s) for vlc, vlc-firefox. You can update them via
Package Manager or with a single command from console:
pisi up vlc vlc-firefox
References
==========
* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732
* http://www.orange-bat.com/adv/2008/adv.08.16.txt
* http://www.orange-bat.com/adv/2008/adv.08.24.txt
* http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048308.html
* http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048504.html
------------------------------------------------------------------------
--
Pınar Yanardağ
Pardus Security Team
http://security.pardus.org.tr
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists