Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:17741
HistoryAug 10, 2007 - 12:00 a.m.

[ GLSA 200708-02 ] Xvid: Array indexing vulnerabilities

2007-08-1000:00:00
vulners.com
4

Gentoo Linux Security Advisory GLSA 200708-02


                                        http://security.gentoo.org/

Severity: Normal
Title: Xvid: Array indexing vulnerabilities
Date: August 08, 2007
Bugs: #183145
ID: 200708-02


Synopsis

Several array indexing vulnerabilities were discovered in Xvid,
possibly allowing for the remote execution of arbitrary code.

Background

Xvid is a popular open source video codec licensed under the GPL.

Affected packages

-------------------------------------------------------------------
 Package          /  Vulnerable  /                      Unaffected
-------------------------------------------------------------------

1 media-libs/xvid < 1.1.3 >= 1.1.3

Description

Trixter Jack discovered an array indexing error in the
get_intra_block() function in the file src/bitstream/mbcoding.c. The
get_inter_block_h263() and get_inter_block_mpeg() functions in the same
file were also reported as vulnerable.

Impact

An attacker could exploit these vulnerabilities to execute arbitrary
code by tricking a user or automated system into processing a malicious
video file with an application that makes use of the Xvid library.

Workaround

There is no known workaround at this time.

Resolution

All Xvid users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-libs/xvid-1.1.3&quot;

References

[ 1 ] CVE-2007-3329
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3329

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200708-02.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
http://bugs.gentoo.org.

License

Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5