what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 24448

Secunia Security Advisory 24448
Posted Mar 13, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for xine-lib. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, mandriva
SHA-256 | baef642872c3188d483865fbb6c4744d165fba474b35d57f4b0be8738eff63d5

Secunia Security Advisory 24448

Change Mirror Download


----------------------------------------------------------------------

Want a new job?
http://secunia.com/secunia_vacancies/

Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/

----------------------------------------------------------------------

TITLE:
Mandriva update for xine-lib

SECUNIA ADVISORY ID:
SA24448

VERIFY ADVISORY:
http://secunia.com/advisories/24448/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for xine-lib. This fixes a
vulnerability, which can potentially be exploited by malicious people
to compromise a vulnerable system.

For more information:
SA24443

SOLUTION:
Apply updated packages.

-- Mandriva Linux 2007 --

241273125b4e2014a0fa1580c7ed0413
2007.0/i586/libxine1-1.1.2-3.3mdv2007.0.i586.rpm
e2855220283ec658301068cf00bb266a
2007.0/i586/libxine1-devel-1.1.2-3.3mdv2007.0.i586.rpm
b98b3376e156fb87a34f30aad34e65e5
2007.0/i586/xine-aa-1.1.2-3.3mdv2007.0.i586.rpm
88d1b8d538dcff220bf528674d0bf5b0
2007.0/i586/xine-arts-1.1.2-3.3mdv2007.0.i586.rpm
ce54bd05bd941b2224c549bf685c0a08
2007.0/i586/xine-dxr3-1.1.2-3.3mdv2007.0.i586.rpm
0e33ea09058a1cd82fd8720278243c14
2007.0/i586/xine-esd-1.1.2-3.3mdv2007.0.i586.rpm
0e8c92ffdc4c3c8073531a72a47da8ca
2007.0/i586/xine-flac-1.1.2-3.3mdv2007.0.i586.rpm
3d7eb8f9a5f45ddebd7ccc20cec808f0
2007.0/i586/xine-gnomevfs-1.1.2-3.3mdv2007.0.i586.rpm
5a1390613c4505b2bfcd326ff0156b0c
2007.0/i586/xine-image-1.1.2-3.3mdv2007.0.i586.rpm
79899e7608558bb490003b9cba2a978c
2007.0/i586/xine-plugins-1.1.2-3.3mdv2007.0.i586.rpm
ed4c39cfe82d66caa19c023a8495c4a1
2007.0/i586/xine-sdl-1.1.2-3.3mdv2007.0.i586.rpm
9256f65fff35cd6c25fd0b19823dcc8a
2007.0/i586/xine-smb-1.1.2-3.3mdv2007.0.i586.rpm
0bf2ceba6a15a079bf2890265b8f1a55
2007.0/SRPMS/xine-lib-1.1.2-3.3mdv2007.0.src.rpm

-- Mandriva Linux 2007/X86_64 --

d92a6bebe5c1e915ed6dca150f32de2e
2007.0/x86_64/lib64xine1-1.1.2-3.3mdv2007.0.x86_64.rpm
eb0c2f9d95f04e3d9c8ea1282c41f5dc
2007.0/x86_64/lib64xine1-devel-1.1.2-3.3mdv2007.0.x86_64.rpm
cd81757a9c25e480d10932cb4d40f6e0
2007.0/x86_64/xine-aa-1.1.2-3.3mdv2007.0.x86_64.rpm
acbaf60373d75281d3c3c7da24d7a1de
2007.0/x86_64/xine-arts-1.1.2-3.3mdv2007.0.x86_64.rpm
38997b2bd174345dcec41682569868c1
2007.0/x86_64/xine-dxr3-1.1.2-3.3mdv2007.0.x86_64.rpm
2425cc89f26171fc32f889ccf0b5b96c
2007.0/x86_64/xine-esd-1.1.2-3.3mdv2007.0.x86_64.rpm
5ddcb92e47e6f35de1db5482edf98a9c
2007.0/x86_64/xine-flac-1.1.2-3.3mdv2007.0.x86_64.rpm
c68e811900a94bd92d65832f64bcdb8a
2007.0/x86_64/xine-gnomevfs-1.1.2-3.3mdv2007.0.x86_64.rpm
f6aa73615c7c9a7238838641afc6af6a
2007.0/x86_64/xine-image-1.1.2-3.3mdv2007.0.x86_64.rpm
4437aff317d159abbd1785fbe53368e7
2007.0/x86_64/xine-plugins-1.1.2-3.3mdv2007.0.x86_64.rpm
4f062b56c298e09b0ec364c18814917f
2007.0/x86_64/xine-sdl-1.1.2-3.3mdv2007.0.x86_64.rpm
fa2a314dbde0ccedf85043e10d94f3d3
2007.0/x86_64/xine-smb-1.1.2-3.3mdv2007.0.x86_64.rpm
0bf2ceba6a15a079bf2890265b8f1a55
2007.0/SRPMS/xine-lib-1.1.2-3.3mdv2007.0.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2007:057

OTHER REFERENCES:
SA24443:
http://secunia.com/advisories/24443/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close