Mandrake Linux Security Advisory : xine-lib (MDKSA-2005:011)

Critical Nessus Plugin ID 16220


The remote Mandrake Linux host is missing one or more security updates.


iDefense discovered that the PNA_TAG handling code in pnm_get_chunk() does not check if the input size is larger than the buffer size (CVE-2004-1187). As well, they discovered that in this same function, a negative value could be given to an unsigned variable that specifies the read length of input data (CVE-2004-1188).

Ariel Berkman discovered that xine-lib reads specific input data into an array without checking the input size making it vulnerable to a buffer overflow problem (CVE-2004-1300).

The updated packages have been patched to prevent these problems.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 16220

File Name: mandrake_MDKSA-2005-011.nasl

Version: $Revision: 1.17 $

Type: local

Published: 2005/01/19

Modified: 2013/08/09

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64xine1, p-cpe:/a:mandriva:linux:lib64xine1-devel, p-cpe:/a:mandriva:linux:libxine1, p-cpe:/a:mandriva:linux:libxine1-devel, p-cpe:/a:mandriva:linux:xine-aa, p-cpe:/a:mandriva:linux:xine-arts, p-cpe:/a:mandriva:linux:xine-dxr3, p-cpe:/a:mandriva:linux:xine-esd, p-cpe:/a:mandriva:linux:xine-flac, p-cpe:/a:mandriva:linux:xine-gnomevfs, p-cpe:/a:mandriva:linux:xine-plugins, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:10.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2005/01/19

Reference Information

CVE: CVE-2004-1187, CVE-2004-1188, CVE-2004-1300

MDKSA: 2005:011