Linux Security
Linux Security
Linux Security

Debian: New vlc packages fix several vulnerabilities

Date 09 Apr 2008
Posted By LinuxSecurity Advisories
A buffer overflow vulnerability in subtitle handling allows an attacker to execute arbitrary code through the opening of a maliciously crafted MicroDVD, SSA or Vplayer file.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1543-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                           Devin Carraway
April 09, 2008              
- ------------------------------------------------------------------------

Package        : vlc
Vulnerability  : multiple
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2007-6681 CVE-2007-6682 CVE-2007-6683 CVE-2008-0295
                 CVE-2008-0296 CVE-2008-0073 CVE-2008-0984 CVE-2008-1489

Luigi Auriemma, Alin Rad Pop, Rémi Denis-Courmont, Quovodis, Guido
Landi, Felipe Manzano, Anibal Sacco and others discovered multiple
vulnerabilities in vlc, an application for playback and streaming of
audio and video.  In the worst case, these weaknesses permit a remote,
unauthenticated attacker to execute arbitrary code with the privileges
of the user running vlc.

The Common Vulnerabilities and Exposures project identifies the
following eight problems:


    A buffer overflow vulnerability in subtitle handling allows an
    attacker to execute arbitrary code through the opening of a
    maliciously crafted MicroDVD, SSA or Vplayer file.


    A format string vulnerability in the HTTP-based remote control
    facility of the vlc application allows a remote, unauthenticated
    attacker to execute arbitrary code.


    Insecure argument validation allows a remote attacker to overwrite
    arbitrary files writable by the user running vlc, if a maliciously
    crafted M3U playlist or MP3 audio file is opened.

CVE-2008-0295, CVE-2008-0296

    Heap buffer overflows in RTSP stream and session description
    protocol (SDP) handling allow an attacker to execute arbitrary
    code if a maliciously-crafted RTSP stream is played.


    Insufficient integer bounds checking in SDP handling allows the
    execution of arbitrary code through a maliciously crafted SDP
    stream ID parameter in an RTSP stream.


    Insufficient integrity checking in the MP4 demuxer allows a remote
    attacker to overwrite arbitrary memory and execute arbitrary code
    if a maliciously-crafted MP4 file is opened.


    An integer overflow vulnerability in MP4 handling allows a remote
    attacker to cause a heap buffer overflow, inducing a crash and
    possibly the execution of arbitrary code if a maliciously-crafted
    MP4 file is opened.

For the stable distribution (etch), these problems have been fixed in
version 0.8.6-svn20061012.debian-5.1+etch2.

For the unstable distribution (sid), these problems have been fixed in
version 0.6.8.e-2.

We recommend that you upgrade your vlc packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 4.0 (stable)
- -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum:  2383751 4429c3a0764cadf7bdcb67a90bdd5cac
    Size/MD5 checksum: 15168393 30c18a2fdc4105606033ff6e6aeab81c
    Size/MD5 checksum:     2614 6337a0f1aa8c1f4b1a98648d66c55c7f

Architecture independent packages:
    Size/MD5 checksum:      784 0eb16d5cb4300c269d767d8efcf6fd56
    Size/MD5 checksum:      778 6e2045ca43d51b8d8651640405c6e501

alpha architecture (DEC Alpha)
    Size/MD5 checksum:    13048 2dde2077d6c6b6b62760db79420e1964
    Size/MD5 checksum:     4442 4efa89adf58bc5b546e6cd039ba09220
    Size/MD5 checksum:    19970 ca201d67fe04a84a6383ccd02bb8b605
    Size/MD5 checksum:    40322 4d0ce0d3d9f6b1915057d78a0785b143
    Size/MD5 checksum:  5177304 744b30a6fd7ef97b628c552498548497
    Size/MD5 checksum:     5022 c3b741230821c5d659d1f1266b03aa15
    Size/MD5 checksum:  1157508 c98bf642658359cd96ae1feb1c0f0554
    Size/MD5 checksum:  1307404 c3d2226ae485e006942fd1f702d02e33
    Size/MD5 checksum:     6936 602249848f8d85444381ad3b05249c61

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:     4186 358a9c42de2f15e0050630ce8db82f49
    Size/MD5 checksum:     4518 81e7edd9360bc8718f4e50c068aa5e2e
    Size/MD5 checksum:  1144080 86f1045c52f86d0072e62c7bc4710961
    Size/MD5 checksum:    20190 26a4e777b60bab308122f54a121571ed
    Size/MD5 checksum:  4665850 754a2eea305e438ca4ea530baccb41f6
    Size/MD5 checksum:     6052 4761ccae31f7fb91df097ae02d1db13b
    Size/MD5 checksum:    36768 15815cd72ec44625960f56121fbdd163
    Size/MD5 checksum:    11330 19e27b3dcc17d19d40c63a424ffb3b74
    Size/MD5 checksum:   951086 6a43d0f74f693ea25a5e96e76b9cbe5b

arm architecture (ARM)
    Size/MD5 checksum:  1268066 02da0972696750201f1b4edea59bf902
    Size/MD5 checksum:     6102 eb452de9bf1f548170b4d4772f3e1d8c
    Size/MD5 checksum:    20034 1a75d857a80a57042a05da96528947e4
    Size/MD5 checksum:    33322 d255b25f957424b69cbf3cd14c9f6027
    Size/MD5 checksum:  4734674 d80973f148a42666859771092bc66d53
    Size/MD5 checksum:     4210 4ca63149485e881e9327b826bd7f4fb7
    Size/MD5 checksum:   998936 809bafbe7249543ea1dcac9c39e28814
    Size/MD5 checksum:     5586 59dbd1c633375ef1ca6bbdd110b32103
    Size/MD5 checksum:    10806 7b692bcdb8ba8289a1bf3770f5deb019

hppa architecture (HP PA RISC)
    Size/MD5 checksum:    13748 024e3a2176324596213dc46604a3544d
    Size/MD5 checksum:  5231084 ac7073a0035ee2427a9db4b490ea4ee7
    Size/MD5 checksum:  1084424 c8756e64fb1e5e7aaafb78844c698ea8
    Size/MD5 checksum:    46664 2b320178feb2bbbae07659b0999ad728
    Size/MD5 checksum:  1374206 3a444f5aeebbfe8c0bf3a44351753227
    Size/MD5 checksum:     6960 d83669890e1a6359a7543c81245558f5
    Size/MD5 checksum:     5360 fc5f122f3e2e62e56b6d2bca5ceedac5
    Size/MD5 checksum:    20136 8cc0b29360f4c14fe7e6d67dabe6fb6b
    Size/MD5 checksum:     7792 d5644b71b9d5e0576f465615e19e59cc

i386 architecture (Intel ia32)
    Size/MD5 checksum:     4106 8c02653af9311594966affefa77a8d1d
    Size/MD5 checksum:    20184 e9561fd52a2621b8aeb90fc2f84952ef
    Size/MD5 checksum:   957988 5e8bfccc97aec6801d4e91f7f79190ad
    Size/MD5 checksum:     4540 f79b718bb0fb3c959e10a1f0e19c82b2
    Size/MD5 checksum:     5844 00dc67fdbfe9757623839055df9da79b
    Size/MD5 checksum:     4818 129657185fbe2d7afc776d3081de6d1b
    Size/MD5 checksum:    10716 558734e32098ae9dcf9a0e4f8d17b9ad
    Size/MD5 checksum:  4626988 2be57767012d22087957e5821fc5f039
    Size/MD5 checksum:  1137658 0d1565969274d720665bd260bf985448
    Size/MD5 checksum:     4138 0c4017ad5d34eef96b28cdd24125b7b2
    Size/MD5 checksum:    36188 a51e365e9eab11dc6495ea638b07ff04

ia64 architecture (Intel ia64)
    Size/MD5 checksum:     5446 4bd7a8aa9ffdeeb92af617e01f34c8a8
    Size/MD5 checksum:  1568906 05044a1e508e84db111ee0ee3d85b675
    Size/MD5 checksum:    49108 d9f76b5ab3d4c8e44bae8b9f1bff68f0
    Size/MD5 checksum:  5904342 16fe4a1010b0195f27eb7b2360269dfd
    Size/MD5 checksum:     9098 965e4b181f3d9e74279e7156d11988c7
    Size/MD5 checksum:    20132 ec05ce0fa6d022222d2e9f89fc087205
    Size/MD5 checksum:  1459208 3d549b3d18833d33e6cb374aa3b3a3e6
    Size/MD5 checksum:     6206 774a31208c986344fce6de1e9166e6a3
    Size/MD5 checksum:    17186 542b1bb71909328529927bcfc3f8bf9f

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:  4992336 567d501ec4e4fabc1abd96c37f72e5c2
    Size/MD5 checksum:    20048 8b5df3829a534020689e46a1ec9d90ad
    Size/MD5 checksum:     4486 03de077e7343083d1acaf68933e50e63
    Size/MD5 checksum:     5964 1582ee4ea7a632707b154375b154f589
    Size/MD5 checksum:    35576 057e1c1e7c3fe40a559412fe0dc15993
    Size/MD5 checksum:  1109938 27ecbceeb56f8252169f8cb5a0965bec
    Size/MD5 checksum:    12276 f4271076704b885cdba3ddc4ea13af54
    Size/MD5 checksum:     6846 0fba8c551a00e996d7180b594d036ce1
    Size/MD5 checksum:  1005576 cda98754f16880c860ba4dfb0e2f5d84

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:  1005628 cc8284dc0e2c37a8cb8d5f7b3905ab67
    Size/MD5 checksum:    11948 f60b93957001af64b98a5ad0711e5cf7
    Size/MD5 checksum:    34618 13fc079120bae335d89eb33b92f52940
    Size/MD5 checksum:    20140 70191b75acf2eb4c58c34d1b8be591c1
    Size/MD5 checksum:   922612 54bfaf3c3eb3b19f0714d8b0de5237b7
    Size/MD5 checksum:     5918 8e7edf87b7f3fbbf00286e6fa9c360d3
    Size/MD5 checksum:     4480 9fa80f663454ed8fb808849b2290fa1d
    Size/MD5 checksum:  4667782 3679f996505b29854f3b03bd13e96b93
    Size/MD5 checksum:     6714 74b0c49a181154ac26d1efed613e4d91

powerpc architecture (PowerPC)
    Size/MD5 checksum:  1020782 e46bfa0668b50ebf34259c7e990276dd
    Size/MD5 checksum:    20196 5e8a83fd4e825527c8be82e0e2a66c74
    Size/MD5 checksum:     7976 b55ac0427e5d4d2816fa7b9f15669b3f
    Size/MD5 checksum:  5098930 fee368e3868bcad1d587eba8bdb0193e
    Size/MD5 checksum:    38238 af84ad7b77101b7a45462283b455d4c1
    Size/MD5 checksum:     6906 cd462e598e15d3f2147eb1eb224679ec
    Size/MD5 checksum:    13674 99248778e655e23ffa52ed41a496c9ab
    Size/MD5 checksum:     5624 a506a0cb520dd7b9c9bcd1ed999a30ba
    Size/MD5 checksum:  1188886 69ffa9a6f4a0d90e54bf5764974f6035

s390 architecture (IBM S/390)
    Size/MD5 checksum:    20130 bc0e62799b86a7bfbeedfc7864f398d1
    Size/MD5 checksum:  1172960 cc56ced14c4ee3d5d22062f93c436329
    Size/MD5 checksum:    11412 ea595a287d20d338299f24f710c0573b
    Size/MD5 checksum:    38334 85cd8a72aa36ac5f26be3ee5750d3067
    Size/MD5 checksum:  4860002 b89b90d7d86c4a3fcf3dccc078076ccb
    Size/MD5 checksum:     6052 e7c83a80acf31a651d52a4d5f5fe7e9a
    Size/MD5 checksum:     6324 d55ec88b0ad7f013bfa98092dab0cfcb
    Size/MD5 checksum:  1019244 c251ec27920487c738f8cf066cc68a1e
    Size/MD5 checksum:     4298 220d422067ce6afa11b7d9ad59c2d2a9

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:     5750 3e7afff7945c3e8c0d47028f796d3db7
    Size/MD5 checksum:  1189608 98626258ae677dc1377d125d3a9561f6
    Size/MD5 checksum:    10402 093498ebe1f1cf92c11c14c76e8103a7
    Size/MD5 checksum:     3920 6424651bd9f7e1dc02b32f54405102c6
    Size/MD5 checksum:  4660246 e140b92e49e8696cf8f8e79fd3602db3
    Size/MD5 checksum:    20132 aa1be17dfad7343c6e9f0529994a5780
    Size/MD5 checksum:    33300 a8780853e4bafa376731ba0bca0badbf
    Size/MD5 checksum:     4752 bceca30ee766bad0fad02a43bc869f8a
    Size/MD5 checksum:   950520 02d9f43b9b116abc2836db2bf55cfc64

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.