what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

XSA-2004-1and2.html

XSA-2004-1and2.html
Posted Apr 21, 2004
Site xinehq.de

When opening a malicious MRL in any xine-lib or xine-ui based media player, an attacker can write arbitrary content to an arbitrary file, only restricted by the permissions of the user running the application.

tags | advisory, arbitrary
SHA-256 | fce37c6c031d3dd1020967e99ac804e22be18eb589ad4043485504871ff9ba5a

XSA-2004-1and2.html

Change Mirror Download
<!-- CONTENT starts here -->
<div class="spacer10"></div><pre>
xine security announcement
==========================

Announcement-ID: XSA-2004-1

Summary:
By opening a malicious MRL in any xine-lib based media player, an attacker can
write arbitrary content to an arbitrary file, only restricted by the
permissions of the user running the application.

Description:
MRLs (media resource locator) are a subset of URIs used by the xine-lib
library to describe the location of the content to play. MRLs also offer the
feature of providing xine configuration options, which will be activated
right before the addressed content is played. But some of xine's
configuration options specify files that will be written to during playback.
One example of such an option is "audio.sun_audio_device", which specifies
the audio device on SUN machines. The decoded PCM samples of the audio stream
will be written to this file. By having a user open a MRL like
"<a href="http://myserver/mybashrc">http://myserver/mybashrc</a>#audio.sun_audio_device:.bashrc" in xine, which
changes the value of the "audio.sun_audio_device" option and plays a
specially crafted audio stream, an attacker could fill any file the user has
access to with arbitrary content. Other configuration options that allow such
an attack exist (we also found "dxr3.devicename"), so the vulnerability is
not limited to SUN machines.

Severity:
Expoits have not been seen in the public and not all xine setups use the
vulnerable configuration options. But at least xine users on SUN machines and
users of a DXR3 or Hollywood+ MPEG decoder card are vulnerable. Other such
problematic configuration options might have slipped through the review or
might be provided by xine plugins outside the main xine distribution, leaving
other users vulnerable as well. Given the wide range of possible harm, we
consider this problem to be highly critical.

Affected versions:
All 1-alpha releases.
All 1-beta releases.
All 1-rc releases up to and including 1-rc3a.

Unaffected versions:
All 0.9 releases or older.
1-rc3b or newer.

Solution:
Changes to xine configuration options via MRL are now disabled by default.
The attached patch to xine-lib fixes the problem but should only be used by
distributors who do not want to upgrade. Otherwise, we strongly advise
everyone to upgrade to the 1-rc3c release of xine-lib.

For further information and in case of questions, please contact the xine
team. Our website is <a href="http://xinehq.de/">http://xinehq.de/</a>
</pre>

<!-- CONTENT ends here -->
<!-- CONTENT starts here -->
<div class="spacer10"></div><pre>Announcement-ID: XSA-2004-2

Summary:
By opening a malicious playlist in the xine-ui media player, an attacker can
write arbitrary content to an arbitrary file, only restricted by the
permissions of the user running xine-ui.

Description:
xine-ui offers the feature of embedding special items in playlists that will
apply changes to xine configuration options once the playlist item is played.
But some of xine's configuration options specify files that will be written
to during playback. One example of such an option is
"audio.sun_audio_device", which specifies the audio device on SUN machines.
The decoded PCM samples of the audio stream will be written to this file. By
having a user open a playlist with an entry
"cfg:/audio.sun_audio_device:.bashrc" followed by an entry
"<a href="http://myserver/mybashrc"">http://myserver/mybashrc"</a> in xine-ui, the value of the
"audio.sun_audio_device" option will be changed and the next entry will play
a specially crafted audio stream. This way an attacker could fill any file
the user has access to with arbitrary content. Other configuration options
that allow such an attack exist (we also found "dxr3.devicename"), so the
vulnerability is not limited to SUN machines.

Severity:
Expoits have not been seen in the public and not all xine setups use the
vulnerable configuration options. But at least xine users on SUN machines and
users of a DXR3 or Hollywood+ MPEG decoder card are vulnerable. Other such
problematic configuration options might have slipped through the review or
might be provided by xine plugins outside the main xine distribution, leaving
other users vulnerable as well. Given the wide range of possible harm, we
consider this problem to be highly critical.

Affected versions:
All releases starting with 0.9.21 up to and including 0.9.23.

Unaffected versions:
All releases older than 0.9.21.
CVS HEAD has been fixed.
The upcoming 0.99.1 release.

Solution:
Changes to xine configuration options via playlist are now disabled by
default.
The attached patch to xine-ui fixes the problem but should only be used by
distributors who do not want to upgrade. Otherwise, we strongly advise
everyone to upgrade to CVS HEAD or to the next version of xine-ui, which is
to be released soon.

For further information and in case of questions, please contact the xine
team. Our website is <a href="http://xinehq.de/">http://xinehq.de/</a>
</pre>

<!-- CONTENT ends here -->
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close