exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 24448

Secunia Security Advisory 24448
Posted Mar 13, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for xine-lib. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, mandriva
SHA-256 | baef642872c3188d483865fbb6c4744d165fba474b35d57f4b0be8738eff63d5

Secunia Security Advisory 24448

Change Mirror Download


----------------------------------------------------------------------

Want a new job?
http://secunia.com/secunia_vacancies/

Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/

----------------------------------------------------------------------

TITLE:
Mandriva update for xine-lib

SECUNIA ADVISORY ID:
SA24448

VERIFY ADVISORY:
http://secunia.com/advisories/24448/

CRITICAL:
Highly critical

IMPACT:
DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for xine-lib. This fixes a
vulnerability, which can potentially be exploited by malicious people
to compromise a vulnerable system.

For more information:
SA24443

SOLUTION:
Apply updated packages.

-- Mandriva Linux 2007 --

241273125b4e2014a0fa1580c7ed0413
2007.0/i586/libxine1-1.1.2-3.3mdv2007.0.i586.rpm
e2855220283ec658301068cf00bb266a
2007.0/i586/libxine1-devel-1.1.2-3.3mdv2007.0.i586.rpm
b98b3376e156fb87a34f30aad34e65e5
2007.0/i586/xine-aa-1.1.2-3.3mdv2007.0.i586.rpm
88d1b8d538dcff220bf528674d0bf5b0
2007.0/i586/xine-arts-1.1.2-3.3mdv2007.0.i586.rpm
ce54bd05bd941b2224c549bf685c0a08
2007.0/i586/xine-dxr3-1.1.2-3.3mdv2007.0.i586.rpm
0e33ea09058a1cd82fd8720278243c14
2007.0/i586/xine-esd-1.1.2-3.3mdv2007.0.i586.rpm
0e8c92ffdc4c3c8073531a72a47da8ca
2007.0/i586/xine-flac-1.1.2-3.3mdv2007.0.i586.rpm
3d7eb8f9a5f45ddebd7ccc20cec808f0
2007.0/i586/xine-gnomevfs-1.1.2-3.3mdv2007.0.i586.rpm
5a1390613c4505b2bfcd326ff0156b0c
2007.0/i586/xine-image-1.1.2-3.3mdv2007.0.i586.rpm
79899e7608558bb490003b9cba2a978c
2007.0/i586/xine-plugins-1.1.2-3.3mdv2007.0.i586.rpm
ed4c39cfe82d66caa19c023a8495c4a1
2007.0/i586/xine-sdl-1.1.2-3.3mdv2007.0.i586.rpm
9256f65fff35cd6c25fd0b19823dcc8a
2007.0/i586/xine-smb-1.1.2-3.3mdv2007.0.i586.rpm
0bf2ceba6a15a079bf2890265b8f1a55
2007.0/SRPMS/xine-lib-1.1.2-3.3mdv2007.0.src.rpm

-- Mandriva Linux 2007/X86_64 --

d92a6bebe5c1e915ed6dca150f32de2e
2007.0/x86_64/lib64xine1-1.1.2-3.3mdv2007.0.x86_64.rpm
eb0c2f9d95f04e3d9c8ea1282c41f5dc
2007.0/x86_64/lib64xine1-devel-1.1.2-3.3mdv2007.0.x86_64.rpm
cd81757a9c25e480d10932cb4d40f6e0
2007.0/x86_64/xine-aa-1.1.2-3.3mdv2007.0.x86_64.rpm
acbaf60373d75281d3c3c7da24d7a1de
2007.0/x86_64/xine-arts-1.1.2-3.3mdv2007.0.x86_64.rpm
38997b2bd174345dcec41682569868c1
2007.0/x86_64/xine-dxr3-1.1.2-3.3mdv2007.0.x86_64.rpm
2425cc89f26171fc32f889ccf0b5b96c
2007.0/x86_64/xine-esd-1.1.2-3.3mdv2007.0.x86_64.rpm
5ddcb92e47e6f35de1db5482edf98a9c
2007.0/x86_64/xine-flac-1.1.2-3.3mdv2007.0.x86_64.rpm
c68e811900a94bd92d65832f64bcdb8a
2007.0/x86_64/xine-gnomevfs-1.1.2-3.3mdv2007.0.x86_64.rpm
f6aa73615c7c9a7238838641afc6af6a
2007.0/x86_64/xine-image-1.1.2-3.3mdv2007.0.x86_64.rpm
4437aff317d159abbd1785fbe53368e7
2007.0/x86_64/xine-plugins-1.1.2-3.3mdv2007.0.x86_64.rpm
4f062b56c298e09b0ec364c18814917f
2007.0/x86_64/xine-sdl-1.1.2-3.3mdv2007.0.x86_64.rpm
fa2a314dbde0ccedf85043e10d94f3d3
2007.0/x86_64/xine-smb-1.1.2-3.3mdv2007.0.x86_64.rpm
0bf2ceba6a15a079bf2890265b8f1a55
2007.0/SRPMS/xine-lib-1.1.2-3.3mdv2007.0.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2007:057

OTHER REFERENCES:
SA24443:
http://secunia.com/advisories/24443/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close