Pardus Linux Security Advisory - Multiple vulnerabilities have discovered by g_ which potentially can be exploited by malicious people to compromise a user's system.
19543faebfa0c824149c043f1f5ca4914a2d200771201b1afa424f14923c36ef
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-29 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2008-08-25
Severity: 3
Type: Remote
------------------------------------------------------------------------
Summary
=======
Multiple vulnerabilities have discovered by g_ which potentially can be
exploited by malicious people to compromise a user's system.
Description
===========
First vulnerability is caused due to an integer overflow error within the
"Open()" function in modules/demux/tta.c. This can be exploited to cause
a heap-based buffer overflow via specially crafted TTA data. Successful
exploitation may potentially allow execution of arbitrary code.
Also, a heap overflow in MMS Protocol Handling can be exploited from remote.
Affected packages:
Pardus 2008:
vlc, all before 0.8.6i-23-10
vlc-firefox, all before 0.8.6i-23-10
Resolution
==========
There are update(s) for vlc, vlc-firefox. You can update them via
Package Manager or with a single command from console:
pisi up vlc vlc-firefox
References
==========
* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3732
* http://www.orange-bat.com/adv/2008/adv.08.16.txt
* http://www.orange-bat.com/adv/2008/adv.08.24.txt
* http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048308.html
* http://mailman.videolan.org/pipermail/vlc-devel/2008-August/048504.html
------------------------------------------------------------------------
--
Pınar Yanardağ
Pardus Security Team
http://security.pardus.org.tr