------------------------------------------------------------------------ Pardus Linux Security Advisory 2008-29 security@pardus.org.tr ------------------------------------------------------------------------ Date: 2008-08-25 Severity: 3 Type: Remote ------------------------------------------------------------------------ Summary ======= Multiple vulnerabilities have discovered by g_ which potentially can be exploited by malicious people to compromise a user's system. Description =========== First vulnerability is caused due to an integer overflow error within the "Open()" function in modules/demux/tta.c. This can be exploited to cause a heap-based buffer overflow via specially crafted TTA data. Successful exploitation may potentially allow execution of arbitrary code. Also, a heap overflow in MMS Protocol Handling can be exploited from remote. Affected packages: Pardus 2008: vlc, all before 0.8.6i-23-10 vlc-firefox, all before 0.8.6i-23-10 Resolution ========== There are update(s) for vlc, vlc-firefox. You can update them via Package Manager or with a single command from console: pisi up vlc vlc-firefox References ========== * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732 * http://www.orange-bat.com/adv/2008/adv.08.16.txt * http://www.orange-bat.com/adv/2008/adv.08.24.txt * http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048308.html * http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048504.html ------------------------------------------------------------------------ -- Pınar Yanardağ Pardus Security Team http://security.pardus.org.tr _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/