Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 139319 - media-libs/xine-lib includes vulnerable MiMMS code? (CVE-2006-2200)
Summary: media-libs/xine-lib includes vulnerable MiMMS code? (CVE-2006-2200)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [glsa] Falco
Keywords:
Depends on:
Blocks:
 
Reported: 2006-07-05 08:15 UTC by Sune Kloppenborg Jeppesen (RETIRED)
Modified: 2008-03-06 09:33 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-07-05 08:15:00 UTC
Stack-based buffer overflow in MiMMS 0.0.9 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.
Comment 1 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-07-05 09:04:17 UTC
yes, i confirm there is at least the string_utf16() issue. But i can't find, for example, the first memcpy overflow.

See the debian patch in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=374577
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-07-11 02:45:32 UTC
Probably a good idea to CC maintainer.
Comment 4 Diego Elio Pettenò (RETIRED) gentoo-dev 2006-07-11 04:06:43 UTC
I handle xine-lib myself, would have been simpler to find if you CCed me :)

This is what Matthias Hopf said on xine-devel:

--
unfortunately this only made it through after xine-lib 1.1.2 release:

There has been a vulnerability report about libmms on [vendor-sec].
(CVE-2006-2200)

Please note that the original patch from the Debian maintainer is
partially incorrect (it should read memset(dest,0,2*len)), but the memset
isn't really necessary and could be nuked anyway. The use of memset in
the patch certainly doesn't do any harm, though, and it fixes the
potential overflow.

Luckily, xine uses libmms in a way that these vulnerabilities cannot be
exploited (buffers are large enough), and the xine module even seems to
rely on the side effects of the memset of the 'broken' library. 
Comment 5 Diego Elio Pettenò (RETIRED) gentoo-dev 2006-07-11 04:06:43 UTC
I handle xine-lib myself, would have been simpler to find if you CCed me :)

This is what Matthias Hopf said on xine-devel:

--
unfortunately this only made it through after xine-lib 1.1.2 release:

There has been a vulnerability report about libmms on [vendor-sec].
(CVE-2006-2200)

Please note that the original patch from the Debian maintainer is
partially incorrect (it should read memset(dest,0,2*len)), but the memset
isn't really necessary and could be nuked anyway. The use of memset in
the patch certainly doesn't do any harm, though, and it fixes the
potential overflow.

Luckily, xine uses libmms in a way that these vulnerabilities cannot be
exploited (buffers are large enough), and the xine module even seems to
rely on the side effects of the memset of the 'broken' library.  Note
that the library sources are included (not an externally linked
library).

While analyzing the source I found a couple of potential heap overflows,
though, which I'm pretty sure that they can be exploited with some
effort. They are fixed in CVS. I also attached the according patch. But
I'm pretty sure that I overlooked some additional ones.

This source is a wormhole.
Sorry, Thibaut, but then you maybe coded the glue layer only :-]
--

Will prepare a 1.1.2-r2 after lunch, or during lunch. -r2 in less than 24 hours past release, sigh.
Comment 6 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-07-11 04:12:01 UTC
Thx Diego.

I assumed that you were on the media-video alias?
Comment 7 Diego Elio Pettenò (RETIRED) gentoo-dev 2006-07-11 04:20:44 UTC
I am, I just assign different priorities to them :P
Depending on the quantity of new messages sometime i mark all as read on aliases, but never on my own. Anyway, building xine-lib-1.1.2-r2 now.
Comment 8 Diego Elio Pettenò (RETIRED) gentoo-dev 2006-07-11 04:28:28 UTC
1.1.2-r2 in portage. Stable marking shouldn't be an issue for most arches, as this version has no big changes since last snapshots (as most of the patches applied before are now merged upstream, and are the important changes in the last month or so).

The only problem is with ~sh that is missing ffmpeg dependency, and ia64 that still has 1.1.1 keyworded (vulnerable to other stuff too).
Comment 9 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-07-11 05:29:41 UTC
Thx for clearing that up Diego.

Arches please test and mark stable.
Comment 10 Tobias Scherbaum (RETIRED) gentoo-dev 2006-07-11 11:32:40 UTC
ppc stable
Comment 11 Luis Medinas (RETIRED) gentoo-dev 2006-07-11 16:25:27 UTC
amd32*2 done.
Comment 12 Joshua Jackson (RETIRED) gentoo-dev 2006-07-11 21:18:43 UTC
x86 is all happy ^.^;;
Comment 13 Markus Rothe (RETIRED) gentoo-dev 2006-07-11 23:37:38 UTC
stable on ppc64
Comment 14 Jason Wever (RETIRED) gentoo-dev 2006-07-13 15:57:47 UTC
SPARC, the keyword of time immortal.
Comment 15 Thomas Cort (RETIRED) gentoo-dev 2006-07-14 14:53:28 UTC
 ______________
< alpha stable >
 --------------
        \   ^__^
         \  (oo)\_______
            (__)\       )\/\
                ||----w |
                ||     ||
Comment 16 René Nussbaumer (RETIRED) gentoo-dev 2006-07-15 02:33:06 UTC
Stable on hppa. Sorry for the delay.
Comment 17 Thierry Carrez (RETIRED) gentoo-dev 2006-07-17 09:57:59 UTC
Ready for GLSA
Comment 18 Thierry Carrez (RETIRED) gentoo-dev 2006-07-20 13:18:26 UTC
GLSA 200607-07
Comment 19 Peter Volkov (RETIRED) gentoo-dev 2008-03-06 09:33:54 UTC
Does not affect current (2008.0) release. Removing release.