xine-lib: Format string vulnerability — GLSA 200510-08

xine-lib contains a format string error in CDDB response handling that may be exploited to execute arbitrary code.

Affected packages

media-libs/xine-lib on all architectures
Affected versions < 1.1.0-r5
Unaffected versions >= 1.1.0-r5
revision >= 1.0.1-r4
revision >= 1_rc8-r2

Background

xine-lib is a multimedia library which can be utilized to create multimedia frontends. It includes functions to retrieve information about audio CD contents from public CDDB servers.

Description

Ulf Harnhammar discovered a format string bug in the routines handling CDDB server response contents.

Impact

An attacker could submit malicious information about an audio CD to a public CDDB server (or impersonate a public CDDB server). When the victim plays this CD on a multimedia frontend relying on xine-lib, it could end up executing arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All xine-lib users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose media-libs/xine-lib

References

Release date
October 08, 2005

Latest revision
October 08, 2005: 01

Severity
normal

Exploitable
remote

Bugzilla entries