FreeBSD : libxine -- multiple buffer overflows in RTSP (1b70bef4-649f-11d9-a30e-000a95bc6fae)

critical Nessus Plugin ID 18856

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

A xine security announcement states :

Multiple vulnerabilities have been found and fixed in the Real-Time Streaming Protocol (RTSP) client for RealNetworks servers, including a series of potentially remotely exploitable buffer overflows. This is a joint advisory by the MPlayer and xine teams as the code in question is common to these projects.

Severity: High (arbitrary remote code execution under the user ID running the player) when playing Real RTSP streams. At this time, there is no known exploit for these vulnerabilities.

Solution

Update the affected packages.

See Also

http://xinehq.de

http://www.nessus.org/u?63cf6322

http://www.nessus.org/u?816aa9c0

Plugin Details

Severity: Critical

ID: 18856

File Name: freebsd_pkg_1b70bef4649f11d9a30e000a95bc6fae.nasl

Version: 1.21

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libxine, p-cpe:/a:freebsd:freebsd:mplayer, p-cpe:/a:freebsd:freebsd:mplayer-esound, p-cpe:/a:freebsd:freebsd:mplayer-gtk, p-cpe:/a:freebsd:freebsd:mplayer-gtk-esound, p-cpe:/a:freebsd:freebsd:mplayer-gtk2, p-cpe:/a:freebsd:freebsd:mplayer-gtk2-esound, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 1/12/2005

Vulnerability Publication Date: 5/25/2004

Reference Information

CVE: CVE-2004-0433

BID: 10245