Linux Security
    Linux Security
    Linux Security

    Debian: New vlc packages fix several vulnerabilities

    Date 09 Apr 2008
    Posted By LinuxSecurity Advisories
    A buffer overflow vulnerability in subtitle handling allows an attacker to execute arbitrary code through the opening of a maliciously crafted MicroDVD, SSA or Vplayer file.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1543-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                           Devin Carraway
    April 09, 2008              
    - ------------------------------------------------------------------------
    Package        : vlc
    Vulnerability  : multiple
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2007-6681 CVE-2007-6682 CVE-2007-6683 CVE-2008-0295
                     CVE-2008-0296 CVE-2008-0073 CVE-2008-0984 CVE-2008-1489
    Luigi Auriemma, Alin Rad Pop, Rémi Denis-Courmont, Quovodis, Guido
    Landi, Felipe Manzano, Anibal Sacco and others discovered multiple
    vulnerabilities in vlc, an application for playback and streaming of
    audio and video.  In the worst case, these weaknesses permit a remote,
    unauthenticated attacker to execute arbitrary code with the privileges
    of the user running vlc.
    The Common Vulnerabilities and Exposures project identifies the
    following eight problems:
        A buffer overflow vulnerability in subtitle handling allows an
        attacker to execute arbitrary code through the opening of a
        maliciously crafted MicroDVD, SSA or Vplayer file.
        A format string vulnerability in the HTTP-based remote control
        facility of the vlc application allows a remote, unauthenticated
        attacker to execute arbitrary code.
        Insecure argument validation allows a remote attacker to overwrite
        arbitrary files writable by the user running vlc, if a maliciously
        crafted M3U playlist or MP3 audio file is opened.
    CVE-2008-0295, CVE-2008-0296
        Heap buffer overflows in RTSP stream and session description
        protocol (SDP) handling allow an attacker to execute arbitrary
        code if a maliciously-crafted RTSP stream is played.
        Insufficient integer bounds checking in SDP handling allows the
        execution of arbitrary code through a maliciously crafted SDP
        stream ID parameter in an RTSP stream.
        Insufficient integrity checking in the MP4 demuxer allows a remote
        attacker to overwrite arbitrary memory and execute arbitrary code
        if a maliciously-crafted MP4 file is opened.
        An integer overflow vulnerability in MP4 handling allows a remote
        attacker to cause a heap buffer overflow, inducing a crash and
        possibly the execution of arbitrary code if a maliciously-crafted
        MP4 file is opened.
    For the stable distribution (etch), these problems have been fixed in
    version 0.8.6-svn20061012.debian-5.1+etch2.
    For the unstable distribution (sid), these problems have been fixed in
    version 0.6.8.e-2.
    We recommend that you upgrade your vlc packages.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian 4.0 (stable)
    - -------------------
    Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    Source archives:
        Size/MD5 checksum:  2383751 4429c3a0764cadf7bdcb67a90bdd5cac
        Size/MD5 checksum: 15168393 30c18a2fdc4105606033ff6e6aeab81c
        Size/MD5 checksum:     2614 6337a0f1aa8c1f4b1a98648d66c55c7f
    Architecture independent packages:
        Size/MD5 checksum:      784 0eb16d5cb4300c269d767d8efcf6fd56
        Size/MD5 checksum:      778 6e2045ca43d51b8d8651640405c6e501
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:    13048 2dde2077d6c6b6b62760db79420e1964
        Size/MD5 checksum:     4442 4efa89adf58bc5b546e6cd039ba09220
        Size/MD5 checksum:    19970 ca201d67fe04a84a6383ccd02bb8b605
        Size/MD5 checksum:    40322 4d0ce0d3d9f6b1915057d78a0785b143
        Size/MD5 checksum:  5177304 744b30a6fd7ef97b628c552498548497
        Size/MD5 checksum:     5022 c3b741230821c5d659d1f1266b03aa15
        Size/MD5 checksum:  1157508 c98bf642658359cd96ae1feb1c0f0554
        Size/MD5 checksum:  1307404 c3d2226ae485e006942fd1f702d02e33
        Size/MD5 checksum:     6936 602249848f8d85444381ad3b05249c61
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:     4186 358a9c42de2f15e0050630ce8db82f49
        Size/MD5 checksum:     4518 81e7edd9360bc8718f4e50c068aa5e2e
        Size/MD5 checksum:  1144080 86f1045c52f86d0072e62c7bc4710961
        Size/MD5 checksum:    20190 26a4e777b60bab308122f54a121571ed
        Size/MD5 checksum:  4665850 754a2eea305e438ca4ea530baccb41f6
        Size/MD5 checksum:     6052 4761ccae31f7fb91df097ae02d1db13b
        Size/MD5 checksum:    36768 15815cd72ec44625960f56121fbdd163
        Size/MD5 checksum:    11330 19e27b3dcc17d19d40c63a424ffb3b74
        Size/MD5 checksum:   951086 6a43d0f74f693ea25a5e96e76b9cbe5b
    arm architecture (ARM)
        Size/MD5 checksum:  1268066 02da0972696750201f1b4edea59bf902
        Size/MD5 checksum:     6102 eb452de9bf1f548170b4d4772f3e1d8c
        Size/MD5 checksum:    20034 1a75d857a80a57042a05da96528947e4
        Size/MD5 checksum:    33322 d255b25f957424b69cbf3cd14c9f6027
        Size/MD5 checksum:  4734674 d80973f148a42666859771092bc66d53
        Size/MD5 checksum:     4210 4ca63149485e881e9327b826bd7f4fb7
        Size/MD5 checksum:   998936 809bafbe7249543ea1dcac9c39e28814
        Size/MD5 checksum:     5586 59dbd1c633375ef1ca6bbdd110b32103
        Size/MD5 checksum:    10806 7b692bcdb8ba8289a1bf3770f5deb019
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:    13748 024e3a2176324596213dc46604a3544d
        Size/MD5 checksum:  5231084 ac7073a0035ee2427a9db4b490ea4ee7
        Size/MD5 checksum:  1084424 c8756e64fb1e5e7aaafb78844c698ea8
        Size/MD5 checksum:    46664 2b320178feb2bbbae07659b0999ad728
        Size/MD5 checksum:  1374206 3a444f5aeebbfe8c0bf3a44351753227
        Size/MD5 checksum:     6960 d83669890e1a6359a7543c81245558f5
        Size/MD5 checksum:     5360 fc5f122f3e2e62e56b6d2bca5ceedac5
        Size/MD5 checksum:    20136 8cc0b29360f4c14fe7e6d67dabe6fb6b
        Size/MD5 checksum:     7792 d5644b71b9d5e0576f465615e19e59cc
    i386 architecture (Intel ia32)
        Size/MD5 checksum:     4106 8c02653af9311594966affefa77a8d1d
        Size/MD5 checksum:    20184 e9561fd52a2621b8aeb90fc2f84952ef
        Size/MD5 checksum:   957988 5e8bfccc97aec6801d4e91f7f79190ad
        Size/MD5 checksum:     4540 f79b718bb0fb3c959e10a1f0e19c82b2
        Size/MD5 checksum:     5844 00dc67fdbfe9757623839055df9da79b
        Size/MD5 checksum:     4818 129657185fbe2d7afc776d3081de6d1b
        Size/MD5 checksum:    10716 558734e32098ae9dcf9a0e4f8d17b9ad
        Size/MD5 checksum:  4626988 2be57767012d22087957e5821fc5f039
        Size/MD5 checksum:  1137658 0d1565969274d720665bd260bf985448
        Size/MD5 checksum:     4138 0c4017ad5d34eef96b28cdd24125b7b2
        Size/MD5 checksum:    36188 a51e365e9eab11dc6495ea638b07ff04
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:     5446 4bd7a8aa9ffdeeb92af617e01f34c8a8
        Size/MD5 checksum:  1568906 05044a1e508e84db111ee0ee3d85b675
        Size/MD5 checksum:    49108 d9f76b5ab3d4c8e44bae8b9f1bff68f0
        Size/MD5 checksum:  5904342 16fe4a1010b0195f27eb7b2360269dfd
        Size/MD5 checksum:     9098 965e4b181f3d9e74279e7156d11988c7
        Size/MD5 checksum:    20132 ec05ce0fa6d022222d2e9f89fc087205
        Size/MD5 checksum:  1459208 3d549b3d18833d33e6cb374aa3b3a3e6
        Size/MD5 checksum:     6206 774a31208c986344fce6de1e9166e6a3
        Size/MD5 checksum:    17186 542b1bb71909328529927bcfc3f8bf9f
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:  4992336 567d501ec4e4fabc1abd96c37f72e5c2
        Size/MD5 checksum:    20048 8b5df3829a534020689e46a1ec9d90ad
        Size/MD5 checksum:     4486 03de077e7343083d1acaf68933e50e63
        Size/MD5 checksum:     5964 1582ee4ea7a632707b154375b154f589
        Size/MD5 checksum:    35576 057e1c1e7c3fe40a559412fe0dc15993
        Size/MD5 checksum:  1109938 27ecbceeb56f8252169f8cb5a0965bec
        Size/MD5 checksum:    12276 f4271076704b885cdba3ddc4ea13af54
        Size/MD5 checksum:     6846 0fba8c551a00e996d7180b594d036ce1
        Size/MD5 checksum:  1005576 cda98754f16880c860ba4dfb0e2f5d84
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:  1005628 cc8284dc0e2c37a8cb8d5f7b3905ab67
        Size/MD5 checksum:    11948 f60b93957001af64b98a5ad0711e5cf7
        Size/MD5 checksum:    34618 13fc079120bae335d89eb33b92f52940
        Size/MD5 checksum:    20140 70191b75acf2eb4c58c34d1b8be591c1
        Size/MD5 checksum:   922612 54bfaf3c3eb3b19f0714d8b0de5237b7
        Size/MD5 checksum:     5918 8e7edf87b7f3fbbf00286e6fa9c360d3
        Size/MD5 checksum:     4480 9fa80f663454ed8fb808849b2290fa1d
        Size/MD5 checksum:  4667782 3679f996505b29854f3b03bd13e96b93
        Size/MD5 checksum:     6714 74b0c49a181154ac26d1efed613e4d91
    powerpc architecture (PowerPC)
        Size/MD5 checksum:  1020782 e46bfa0668b50ebf34259c7e990276dd
        Size/MD5 checksum:    20196 5e8a83fd4e825527c8be82e0e2a66c74
        Size/MD5 checksum:     7976 b55ac0427e5d4d2816fa7b9f15669b3f
        Size/MD5 checksum:  5098930 fee368e3868bcad1d587eba8bdb0193e
        Size/MD5 checksum:    38238 af84ad7b77101b7a45462283b455d4c1
        Size/MD5 checksum:     6906 cd462e598e15d3f2147eb1eb224679ec
        Size/MD5 checksum:    13674 99248778e655e23ffa52ed41a496c9ab
        Size/MD5 checksum:     5624 a506a0cb520dd7b9c9bcd1ed999a30ba
        Size/MD5 checksum:  1188886 69ffa9a6f4a0d90e54bf5764974f6035
    s390 architecture (IBM S/390)
        Size/MD5 checksum:    20130 bc0e62799b86a7bfbeedfc7864f398d1
        Size/MD5 checksum:  1172960 cc56ced14c4ee3d5d22062f93c436329
        Size/MD5 checksum:    11412 ea595a287d20d338299f24f710c0573b
        Size/MD5 checksum:    38334 85cd8a72aa36ac5f26be3ee5750d3067
        Size/MD5 checksum:  4860002 b89b90d7d86c4a3fcf3dccc078076ccb
        Size/MD5 checksum:     6052 e7c83a80acf31a651d52a4d5f5fe7e9a
        Size/MD5 checksum:     6324 d55ec88b0ad7f013bfa98092dab0cfcb
        Size/MD5 checksum:  1019244 c251ec27920487c738f8cf066cc68a1e
        Size/MD5 checksum:     4298 220d422067ce6afa11b7d9ad59c2d2a9
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:     5750 3e7afff7945c3e8c0d47028f796d3db7
        Size/MD5 checksum:  1189608 98626258ae677dc1377d125d3a9561f6
        Size/MD5 checksum:    10402 093498ebe1f1cf92c11c14c76e8103a7
        Size/MD5 checksum:     3920 6424651bd9f7e1dc02b32f54405102c6
        Size/MD5 checksum:  4660246 e140b92e49e8696cf8f8e79fd3602db3
        Size/MD5 checksum:    20132 aa1be17dfad7343c6e9f0529994a5780
        Size/MD5 checksum:    33300 a8780853e4bafa376731ba0bca0badbf
        Size/MD5 checksum:     4752 bceca30ee766bad0fad02a43bc869f8a
        Size/MD5 checksum:   950520 02d9f43b9b116abc2836db2bf55cfc64
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"22","type":"x","order":"1","pct":34.92,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"13","type":"x","order":"2","pct":20.63,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"28","type":"x","order":"3","pct":44.44,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.