FreeBSD : libxine -- multiple buffer overflow vulnerabilities (1b043693-8617-11db-93b2-000e35248ad7)

high Nessus Plugin ID 23793

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The libxine development team reports that several vulnerabilities had been found in the libxine library. The first vulnerability is caused by improper checking of the src/input/libreal/real.c 'real_parse_sdp()' function. A remote attacker could exploit this by tricking an user to connect to a preparated server potentially causing a buffer overflow. Another buffer overflow had been found in the libmms library, potentially allowing a remote attacker to cause a denial of service vulnerability, and possible remote code execution through the following functions: send_command, string_utf16, get_data and get_media_packets. Other functions might be affected as well.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?dfc0ac74

http://www.nessus.org/u?0821467f

Plugin Details

Severity: High

ID: 23793

File Name: freebsd_pkg_1b043693861711db93b2000e35248ad7.nasl

Version: 1.16

Type: local

Published: 12/11/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libxine, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/7/2006

Vulnerability Publication Date: 5/4/2006

Reference Information

CVE: CVE-2006-2200, CVE-2006-6172

BID: 18608, 21435