File: gentoo_GLSA-200404-20.nasl

package info (click to toggle)
nessus-plugins 2.2.8-1.1
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 15,508 kB
  • ctags: 251
  • sloc: sh: 8,346; ansic: 4,452; pascal: 3,089; perl: 704; makefile: 172; php: 1
file content (76 lines) | stat: -rw-r--r-- 3,056 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
# This script was automatically generated from 
#  http://www.gentoo.org/security/en/glsa/glsa-200404-20.xml
# It is released under the Nessus Script Licence.
# The messages are release under the Creative Commons - Attribution /
# Share Alike license. See http://creativecommons.org/licenses/by-sa/2.0/
#
# Avisory is copyright 2001-2005 Gentoo Foundation, Inc.
# GLSA2nasl Convertor is copyright 2004 Michel Arboi <mikhail@nessus.org>

if (! defined_func('bn_random')) exit(0);

if (description)
{
 script_id(14485);
 script_version("$Revision: 1.2 $");
 script_xref(name: "GLSA", value: "200404-20");

 desc = 'The remote host is affected by the vulnerability described in GLSA-200404-20
(Multiple vulnerabilities in xine)


    Several vulnerabilities were found in xine-ui and xine-lib. By opening a
    malicious MRL in any xine-lib based media player, an attacker can write
    arbitrary content to an arbitrary file, only restricted by the permissions
    of the user running the application. By opening a malicious playlist in the
    xine-ui media player, an attacker can write arbitrary content to an
    arbitrary file, only restricted by the permissions of the user running
    xine-ui. Finally, a temporary file is created in an insecure manner by the
    xine-check and xine-bugreport scripts, potentially allowing a local
    attacker to use a symlink attack.
  
Impact

    These three vulnerabilities may alow an attacker to corrupt system files,
    thus potentially leading to a Denial of Service. It is also theoretically
    possible, though very unlikely, to use these vulnerabilities to elevate the
    privileges of the attacker.
  
Workaround

    There is no known workaround at this time. All users are advised to upgrade
    to the latest available versions of xine-ui and xine-lib.
  
References:
    http://xinehq.de/index.php/security
    http://nettwerked.mg2.org/advisories/xinebug


Solution: 
    All users of xine-ui or another xine-based player should upgrade to the
    latest stable versions:
    # emerge sync
    # emerge -pv ">=media-video/xine-ui-0.9.23-r2"
    # emerge ">=media-video/xine-ui-0.9.23-r2"
    # emerge -pv ">=media-libs/xine-lib-1_rc3-r3"
    # emerge ">=media-libs/xine-lib-1_rc3-r3"
  

Risk factor : Medium
';
 script_description(english: desc);
 script_copyright(english: "(C) 2005 Michel Arboi <mikhail@nessus.org>");
 script_name(english: "[GLSA-200404-20] Multiple vulnerabilities in xine");
 script_category(ACT_GATHER_INFO);
 script_family(english: "Gentoo Local Security Checks");
 script_dependencies("ssh_get_info.nasl");
 script_require_keys('Host/Gentoo/qpkg-list');
 script_summary(english: 'Multiple vulnerabilities in xine');
 exit(0);
}

include('qpkg.inc');
if (qpkg_check(package: "media-video/xine-ui", unaffected: make_list("ge 0.9.23-r2"), vulnerable: make_list("le 0.9.23-r1")
)) { security_warning(0); exit(0); }
if (qpkg_check(package: "media-libs/xine-lib", unaffected: make_list("ge 1_rc3-r3"), vulnerable: make_list("le 1_rc3-r2")
)) { security_warning(0); exit(0); }