FreeBSD : libxine -- buffer overflow vulnerability (02eedd3c-c6b5-11dc-93b6-000e35248ad7)

medium Nessus Plugin ID 30029

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

xine project reports :

A new xine-lib version is now available. This release contains a security fix (remotely-exploitable buffer overflow, CVE-2008-0225). It also contains a read-past-end fix for an internal library function which is only used if the OS does not supply it and a rendering fix for Darwin/PPC.

Solution

Update the affected package.

See Also

http://aluigi.altervista.org/adv/xinermffhof-adv.txt

http://www.nessus.org/u?fad1312f

Plugin Details

Severity: Medium

ID: 30029

File Name: freebsd_pkg_02eedd3cc6b511dc93b6000e35248ad7.nasl

Version: 1.15

Type: local

Published: 1/21/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.8

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libxine, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/19/2008

Vulnerability Publication Date: 1/8/2008

Reference Information

CVE: CVE-2008-0225

CWE: 119

Secunia: 28384