Home / vulnerabilitiesPDF  

PLSA-2008-29.txt

Posted on 25 August 2008
Source : packetstormsecurity.org Link

 

------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-29 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2008-08-25
Severity: 3
Type: Remote
------------------------------------------------------------------------

Summary
=======

Multiple vulnerabilities have discovered by g_ which potentially can be
exploited by malicious people to compromise a user's system.


Description
===========

First vulnerability is caused due to an integer overflow error within the
"Open()" function in modules/demux/tta.c. This can be exploited to cause
a heap-based buffer overflow via specially crafted TTA data. Successful
exploitation may potentially allow execution of arbitrary code.

Also, a heap overflow in MMS Protocol Handling can be exploited from remote.


Affected packages:

Pardus 2008:
vlc, all before 0.8.6i-23-10
vlc-firefox, all before 0.8.6i-23-10



Resolution
==========

There are update(s) for vlc, vlc-firefox. You can update them via
Package Manager or with a single command from console:

pisi up vlc vlc-firefox

References
==========

* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732
* http://www.orange-bat.com/adv/2008/adv.08.16.txt
* http://www.orange-bat.com/adv/2008/adv.08.24.txt
* http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048308.html
* http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048504.html

------------------------------------------------------------------------

--
Pınar Yanardağ
Pardus Security Team
http://security.pardus.org.tr

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 

TOP