Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2005:011: xine-lib Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the xine-lib package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2005:011 (xine-lib).
iDefense discovered that the PNA_TAG handling code in pnm_get_chunk() does not
check if the input size is larger than the buffer size (CVE-2004-1187). As
well, they discovered that in this same function, a negative value could be
given to an unsigned variable that specifies the read length of input data
Ariel Berkman discovered that xine-lib reads specific input data into an array
without checking the input size making it vulnerable to a buffer overflow
The updated packages have been patched to prevent these problems.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:011
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.