exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-043

Mandriva Linux Security Advisory 2010-043
Posted Feb 20, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-043 - Integer overflow in libtheora in Xiph.Org Theora before 1.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-3389
SHA-256 | 875eca5f9cf314f9aca1502f437c9db9c69e8b91cb31c53973dc02a3822a9159

Mandriva Linux Security Advisory 2010-043

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:043
http://www.mandriva.com/security/
_______________________________________________________________________

Package : libtheora
Date : February 19, 2010
Affected: 2009.0, 2009.1, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability have been discovered and corrected in libtheora:

Integer overflow in libtheora in Xiph.Org Theora before 1.1 allows
remote attackers to cause a denial of service (application crash)
or possibly execute arbitrary code via a video with large dimensions
(CVE-2009-3389).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3389
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
d0e867e4e25b4b789e5cdd32d5839ca6 2009.0/i586/libtheora0-1.0-0.beta3.2.1mdv2009.0.i586.rpm
34c99cc3b86fe3e907d9081a7180661e 2009.0/i586/libtheoradec1-1.0-0.beta3.2.1mdv2009.0.i586.rpm
e3b93763dc4b2b60dbfa2e742e9f7594 2009.0/i586/libtheora-devel-1.0-0.beta3.2.1mdv2009.0.i586.rpm
de9ca7c7ddf8d5eb4cfcd45a09cf9595 2009.0/i586/libtheoraenc1-1.0-0.beta3.2.1mdv2009.0.i586.rpm
9bf2d88ba69041cfe697dc1628d7d9f3 2009.0/SRPMS/libtheora-1.0-0.beta3.2.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
c6e4b2eda4169e03037327745b1df1e9 2009.0/x86_64/lib64theora0-1.0-0.beta3.2.1mdv2009.0.x86_64.rpm
57d6dce86edc17131ac6fa95fdd8b3eb 2009.0/x86_64/lib64theoradec1-1.0-0.beta3.2.1mdv2009.0.x86_64.rpm
f97adc7a0af2a73d9e01869eaaf7e2d3 2009.0/x86_64/lib64theora-devel-1.0-0.beta3.2.1mdv2009.0.x86_64.rpm
80ae795779eea976f4dbd86c877b6fdc 2009.0/x86_64/lib64theoraenc1-1.0-0.beta3.2.1mdv2009.0.x86_64.rpm
9bf2d88ba69041cfe697dc1628d7d9f3 2009.0/SRPMS/libtheora-1.0-0.beta3.2.1mdv2009.0.src.rpm

Mandriva Linux 2009.1:
48a5e1e01c199da61524665735baa348 2009.1/i586/libtheora0-1.0-2.1mdv2009.1.i586.rpm
3f0cc15ffc144c26370b1d668e6c741f 2009.1/i586/libtheoradec1-1.0-2.1mdv2009.1.i586.rpm
5b2c33714f77feb2cdb26c6c3f94a449 2009.1/i586/libtheora-devel-1.0-2.1mdv2009.1.i586.rpm
4d91733d11aac7bcac9040e2847da58a 2009.1/i586/libtheoraenc1-1.0-2.1mdv2009.1.i586.rpm
6551546356f01d076af784a476639abe 2009.1/SRPMS/libtheora-1.0-2.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
7873f3c1cc6c317c35f7ce06909c0b31 2009.1/x86_64/lib64theora0-1.0-2.1mdv2009.1.x86_64.rpm
3c88506b5db69a6b5db667d77a3a9815 2009.1/x86_64/lib64theoradec1-1.0-2.1mdv2009.1.x86_64.rpm
57c250186e12cdf8288d86a3dbe9653a 2009.1/x86_64/lib64theora-devel-1.0-2.1mdv2009.1.x86_64.rpm
30f45754e42ef9a27b5324d9107916af 2009.1/x86_64/lib64theoraenc1-1.0-2.1mdv2009.1.x86_64.rpm
6551546356f01d076af784a476639abe 2009.1/SRPMS/libtheora-1.0-2.1mdv2009.1.src.rpm

Mandriva Enterprise Server 5:
157f767d89a1a3a235ff0193791b46d6 mes5/i586/libtheora0-1.0-0.beta3.2.1mdvmes5.i586.rpm
29282becb9dd7eb1f13ed986a57b21d0 mes5/i586/libtheoradec1-1.0-0.beta3.2.1mdvmes5.i586.rpm
73b740ca6290deab54bd5ff3e37ca6d7 mes5/i586/libtheora-devel-1.0-0.beta3.2.1mdvmes5.i586.rpm
7fdae6488b2573a58038b86fa7bc71aa mes5/i586/libtheoraenc1-1.0-0.beta3.2.1mdvmes5.i586.rpm
7e3e68726c181adef49bb4c3347b5e53 mes5/SRPMS/libtheora-1.0-0.beta3.2.1mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
273544d3b697ed79eb62a8857c12f0a0 mes5/x86_64/lib64theora0-1.0-0.beta3.2.1mdvmes5.x86_64.rpm
a6be3b5eba73e091771cf8533fa6ab08 mes5/x86_64/lib64theoradec1-1.0-0.beta3.2.1mdvmes5.x86_64.rpm
28ea0c309ff23a612e90e5ab2ee90f88 mes5/x86_64/lib64theora-devel-1.0-0.beta3.2.1mdvmes5.x86_64.rpm
cf1ba4a59a2bb729b885652cb11f74f3 mes5/x86_64/lib64theoraenc1-1.0-0.beta3.2.1mdvmes5.x86_64.rpm
7e3e68726c181adef49bb4c3347b5e53 mes5/SRPMS/libtheora-1.0-0.beta3.2.1mdvmes5.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLfrgbmqjQ0CJFipgRAgHiAJ0ZJRgNurGOwe+Cu4EIVChdz/a47ACeJE0W
cpn+v8nuoEUdvq7lYpfFU4E=
=5dbs
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close