Linux Security
    Linux Security
    Linux Security

    Debian: New vlc packages fix several vulnerabilities

    Date 09 Apr 2008
    Posted By LinuxSecurity Advisories
    A buffer overflow vulnerability in subtitle handling allows an attacker to execute arbitrary code through the opening of a maliciously crafted MicroDVD, SSA or Vplayer file.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1543-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                           Devin Carraway
    April 09, 2008              
    - ------------------------------------------------------------------------
    Package        : vlc
    Vulnerability  : multiple
    Problem type   : remote
    Debian-specific: no
    CVE Id(s)      : CVE-2007-6681 CVE-2007-6682 CVE-2007-6683 CVE-2008-0295
                     CVE-2008-0296 CVE-2008-0073 CVE-2008-0984 CVE-2008-1489
    Luigi Auriemma, Alin Rad Pop, Rémi Denis-Courmont, Quovodis, Guido
    Landi, Felipe Manzano, Anibal Sacco and others discovered multiple
    vulnerabilities in vlc, an application for playback and streaming of
    audio and video.  In the worst case, these weaknesses permit a remote,
    unauthenticated attacker to execute arbitrary code with the privileges
    of the user running vlc.
    The Common Vulnerabilities and Exposures project identifies the
    following eight problems:
        A buffer overflow vulnerability in subtitle handling allows an
        attacker to execute arbitrary code through the opening of a
        maliciously crafted MicroDVD, SSA or Vplayer file.
        A format string vulnerability in the HTTP-based remote control
        facility of the vlc application allows a remote, unauthenticated
        attacker to execute arbitrary code.
        Insecure argument validation allows a remote attacker to overwrite
        arbitrary files writable by the user running vlc, if a maliciously
        crafted M3U playlist or MP3 audio file is opened.
    CVE-2008-0295, CVE-2008-0296
        Heap buffer overflows in RTSP stream and session description
        protocol (SDP) handling allow an attacker to execute arbitrary
        code if a maliciously-crafted RTSP stream is played.
        Insufficient integer bounds checking in SDP handling allows the
        execution of arbitrary code through a maliciously crafted SDP
        stream ID parameter in an RTSP stream.
        Insufficient integrity checking in the MP4 demuxer allows a remote
        attacker to overwrite arbitrary memory and execute arbitrary code
        if a maliciously-crafted MP4 file is opened.
        An integer overflow vulnerability in MP4 handling allows a remote
        attacker to cause a heap buffer overflow, inducing a crash and
        possibly the execution of arbitrary code if a maliciously-crafted
        MP4 file is opened.
    For the stable distribution (etch), these problems have been fixed in
    version 0.8.6-svn20061012.debian-5.1+etch2.
    For the unstable distribution (sid), these problems have been fixed in
    version 0.6.8.e-2.
    We recommend that you upgrade your vlc packages.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian 4.0 (stable)
    - -------------------
    Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    Source archives:
        Size/MD5 checksum:  2383751 4429c3a0764cadf7bdcb67a90bdd5cac
        Size/MD5 checksum: 15168393 30c18a2fdc4105606033ff6e6aeab81c
        Size/MD5 checksum:     2614 6337a0f1aa8c1f4b1a98648d66c55c7f
    Architecture independent packages:
        Size/MD5 checksum:      784 0eb16d5cb4300c269d767d8efcf6fd56
        Size/MD5 checksum:      778 6e2045ca43d51b8d8651640405c6e501
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:    13048 2dde2077d6c6b6b62760db79420e1964
        Size/MD5 checksum:     4442 4efa89adf58bc5b546e6cd039ba09220
        Size/MD5 checksum:    19970 ca201d67fe04a84a6383ccd02bb8b605
        Size/MD5 checksum:    40322 4d0ce0d3d9f6b1915057d78a0785b143
        Size/MD5 checksum:  5177304 744b30a6fd7ef97b628c552498548497
        Size/MD5 checksum:     5022 c3b741230821c5d659d1f1266b03aa15
        Size/MD5 checksum:  1157508 c98bf642658359cd96ae1feb1c0f0554
        Size/MD5 checksum:  1307404 c3d2226ae485e006942fd1f702d02e33
        Size/MD5 checksum:     6936 602249848f8d85444381ad3b05249c61
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:     4186 358a9c42de2f15e0050630ce8db82f49
        Size/MD5 checksum:     4518 81e7edd9360bc8718f4e50c068aa5e2e
        Size/MD5 checksum:  1144080 86f1045c52f86d0072e62c7bc4710961
        Size/MD5 checksum:    20190 26a4e777b60bab308122f54a121571ed
        Size/MD5 checksum:  4665850 754a2eea305e438ca4ea530baccb41f6
        Size/MD5 checksum:     6052 4761ccae31f7fb91df097ae02d1db13b
        Size/MD5 checksum:    36768 15815cd72ec44625960f56121fbdd163
        Size/MD5 checksum:    11330 19e27b3dcc17d19d40c63a424ffb3b74
        Size/MD5 checksum:   951086 6a43d0f74f693ea25a5e96e76b9cbe5b
    arm architecture (ARM)
        Size/MD5 checksum:  1268066 02da0972696750201f1b4edea59bf902
        Size/MD5 checksum:     6102 eb452de9bf1f548170b4d4772f3e1d8c
        Size/MD5 checksum:    20034 1a75d857a80a57042a05da96528947e4
        Size/MD5 checksum:    33322 d255b25f957424b69cbf3cd14c9f6027
        Size/MD5 checksum:  4734674 d80973f148a42666859771092bc66d53
        Size/MD5 checksum:     4210 4ca63149485e881e9327b826bd7f4fb7
        Size/MD5 checksum:   998936 809bafbe7249543ea1dcac9c39e28814
        Size/MD5 checksum:     5586 59dbd1c633375ef1ca6bbdd110b32103
        Size/MD5 checksum:    10806 7b692bcdb8ba8289a1bf3770f5deb019
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:    13748 024e3a2176324596213dc46604a3544d
        Size/MD5 checksum:  5231084 ac7073a0035ee2427a9db4b490ea4ee7
        Size/MD5 checksum:  1084424 c8756e64fb1e5e7aaafb78844c698ea8
        Size/MD5 checksum:    46664 2b320178feb2bbbae07659b0999ad728
        Size/MD5 checksum:  1374206 3a444f5aeebbfe8c0bf3a44351753227
        Size/MD5 checksum:     6960 d83669890e1a6359a7543c81245558f5
        Size/MD5 checksum:     5360 fc5f122f3e2e62e56b6d2bca5ceedac5
        Size/MD5 checksum:    20136 8cc0b29360f4c14fe7e6d67dabe6fb6b
        Size/MD5 checksum:     7792 d5644b71b9d5e0576f465615e19e59cc
    i386 architecture (Intel ia32)
        Size/MD5 checksum:     4106 8c02653af9311594966affefa77a8d1d
        Size/MD5 checksum:    20184 e9561fd52a2621b8aeb90fc2f84952ef
        Size/MD5 checksum:   957988 5e8bfccc97aec6801d4e91f7f79190ad
        Size/MD5 checksum:     4540 f79b718bb0fb3c959e10a1f0e19c82b2
        Size/MD5 checksum:     5844 00dc67fdbfe9757623839055df9da79b
        Size/MD5 checksum:     4818 129657185fbe2d7afc776d3081de6d1b
        Size/MD5 checksum:    10716 558734e32098ae9dcf9a0e4f8d17b9ad
        Size/MD5 checksum:  4626988 2be57767012d22087957e5821fc5f039
        Size/MD5 checksum:  1137658 0d1565969274d720665bd260bf985448
        Size/MD5 checksum:     4138 0c4017ad5d34eef96b28cdd24125b7b2
        Size/MD5 checksum:    36188 a51e365e9eab11dc6495ea638b07ff04
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:     5446 4bd7a8aa9ffdeeb92af617e01f34c8a8
        Size/MD5 checksum:  1568906 05044a1e508e84db111ee0ee3d85b675
        Size/MD5 checksum:    49108 d9f76b5ab3d4c8e44bae8b9f1bff68f0
        Size/MD5 checksum:  5904342 16fe4a1010b0195f27eb7b2360269dfd
        Size/MD5 checksum:     9098 965e4b181f3d9e74279e7156d11988c7
        Size/MD5 checksum:    20132 ec05ce0fa6d022222d2e9f89fc087205
        Size/MD5 checksum:  1459208 3d549b3d18833d33e6cb374aa3b3a3e6
        Size/MD5 checksum:     6206 774a31208c986344fce6de1e9166e6a3
        Size/MD5 checksum:    17186 542b1bb71909328529927bcfc3f8bf9f
    mips architecture (MIPS (Big Endian))
        Size/MD5 checksum:  4992336 567d501ec4e4fabc1abd96c37f72e5c2
        Size/MD5 checksum:    20048 8b5df3829a534020689e46a1ec9d90ad
        Size/MD5 checksum:     4486 03de077e7343083d1acaf68933e50e63
        Size/MD5 checksum:     5964 1582ee4ea7a632707b154375b154f589
        Size/MD5 checksum:    35576 057e1c1e7c3fe40a559412fe0dc15993
        Size/MD5 checksum:  1109938 27ecbceeb56f8252169f8cb5a0965bec
        Size/MD5 checksum:    12276 f4271076704b885cdba3ddc4ea13af54
        Size/MD5 checksum:     6846 0fba8c551a00e996d7180b594d036ce1
        Size/MD5 checksum:  1005576 cda98754f16880c860ba4dfb0e2f5d84
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:  1005628 cc8284dc0e2c37a8cb8d5f7b3905ab67
        Size/MD5 checksum:    11948 f60b93957001af64b98a5ad0711e5cf7
        Size/MD5 checksum:    34618 13fc079120bae335d89eb33b92f52940
        Size/MD5 checksum:    20140 70191b75acf2eb4c58c34d1b8be591c1
        Size/MD5 checksum:   922612 54bfaf3c3eb3b19f0714d8b0de5237b7
        Size/MD5 checksum:     5918 8e7edf87b7f3fbbf00286e6fa9c360d3
        Size/MD5 checksum:     4480 9fa80f663454ed8fb808849b2290fa1d
        Size/MD5 checksum:  4667782 3679f996505b29854f3b03bd13e96b93
        Size/MD5 checksum:     6714 74b0c49a181154ac26d1efed613e4d91
    powerpc architecture (PowerPC)
        Size/MD5 checksum:  1020782 e46bfa0668b50ebf34259c7e990276dd
        Size/MD5 checksum:    20196 5e8a83fd4e825527c8be82e0e2a66c74
        Size/MD5 checksum:     7976 b55ac0427e5d4d2816fa7b9f15669b3f
        Size/MD5 checksum:  5098930 fee368e3868bcad1d587eba8bdb0193e
        Size/MD5 checksum:    38238 af84ad7b77101b7a45462283b455d4c1
        Size/MD5 checksum:     6906 cd462e598e15d3f2147eb1eb224679ec
        Size/MD5 checksum:    13674 99248778e655e23ffa52ed41a496c9ab
        Size/MD5 checksum:     5624 a506a0cb520dd7b9c9bcd1ed999a30ba
        Size/MD5 checksum:  1188886 69ffa9a6f4a0d90e54bf5764974f6035
    s390 architecture (IBM S/390)
        Size/MD5 checksum:    20130 bc0e62799b86a7bfbeedfc7864f398d1
        Size/MD5 checksum:  1172960 cc56ced14c4ee3d5d22062f93c436329
        Size/MD5 checksum:    11412 ea595a287d20d338299f24f710c0573b
        Size/MD5 checksum:    38334 85cd8a72aa36ac5f26be3ee5750d3067
        Size/MD5 checksum:  4860002 b89b90d7d86c4a3fcf3dccc078076ccb
        Size/MD5 checksum:     6052 e7c83a80acf31a651d52a4d5f5fe7e9a
        Size/MD5 checksum:     6324 d55ec88b0ad7f013bfa98092dab0cfcb
        Size/MD5 checksum:  1019244 c251ec27920487c738f8cf066cc68a1e
        Size/MD5 checksum:     4298 220d422067ce6afa11b7d9ad59c2d2a9
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:     5750 3e7afff7945c3e8c0d47028f796d3db7
        Size/MD5 checksum:  1189608 98626258ae677dc1377d125d3a9561f6
        Size/MD5 checksum:    10402 093498ebe1f1cf92c11c14c76e8103a7
        Size/MD5 checksum:     3920 6424651bd9f7e1dc02b32f54405102c6
        Size/MD5 checksum:  4660246 e140b92e49e8696cf8f8e79fd3602db3
        Size/MD5 checksum:    20132 aa1be17dfad7343c6e9f0529994a5780
        Size/MD5 checksum:    33300 a8780853e4bafa376731ba0bca0badbf
        Size/MD5 checksum:     4752 bceca30ee766bad0fad02a43bc869f8a
        Size/MD5 checksum:   950520 02d9f43b9b116abc2836db2bf55cfc64
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    How long have you been using Linux?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    [{"id":"160","title":"Just made the switch!","votes":"3","type":"x","order":"1","pct":10.71,"resources":[]},{"id":"161","title":"1-5 years","votes":"5","type":"x","order":"2","pct":17.86,"resources":[]},{"id":"162","title":"6-10 years","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"163","title":">10 years - I'm a veteran!","votes":"20","type":"x","order":"4","pct":71.43,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.