CVE-2005-1692
CVSS7.5
发布时间 :2005-05-24 00:00:00
修订时间 :2016-10-17 23:21:48
NMCOPS    

[原文]Format string vulnerability in gxine 0.4.1 through 0.4.4, and other versions down to 0.3, allows remote attackers to execute arbitrary code via a ram file with a URL whose hostname contains format string specifiers.


[CNNVD]GXINE远程主机名格式串处理漏洞(CNNVD-200505-1173)

        xine是一款免费的多媒体播放器,支持CD、DVD、VCD等。
        Gxine中存在远程格式串漏洞,成功利用这个漏洞可能允许远程攻击者执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:xine:gxine:0.41
cpe:/a:xine:gxine:0.44
cpe:/a:xine:gxine:0.42
cpe:/a:xine:gxine:0.43

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1692
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1692
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-1173
(官方数据源) CNNVD

- 其它链接及资源

http://cvs.sourceforge.net/viewcvs.py/xine/gnome-xine/ChangeLog?rev=HEAD&content-type=text/vnd.viewcvs-markup
(UNKNOWN)  CONFIRM  http://cvs.sourceforge.net/viewcvs.py/xine/gnome-xine/ChangeLog?rev=HEAD&content-type=text/vnd.viewcvs-markup
http://marc.info/?l=bugtraq&m=111670637812128&w=2
(UNKNOWN)  BUGTRAQ  20050521 pst.advisory 2005-21: gxine remote exploitable . opensource is god .lol windows
http://security.gentoo.org/glsa/glsa-200505-19.xml
(UNKNOWN)  GENTOO  GLSA-200505-19
http://www.0xbadexworm.org/adv/gxinefmt.txt
(UNKNOWN)  MISC  http://www.0xbadexworm.org/adv/gxinefmt.txt
http://www.securityfocus.com/bid/13707
(UNKNOWN)  BID  13707
http://www.vupen.com/english/advisories/2005/0626
(UNKNOWN)  VUPEN  ADV-2005-0626

- 漏洞信息

GXINE远程主机名格式串处理漏洞
高危 格式化字符串
2005-05-24 00:00:00 2005-10-20 00:00:00
远程  
        xine是一款免费的多媒体播放器,支持CD、DVD、VCD等。
        Gxine中存在远程格式串漏洞,成功利用这个漏洞可能允许远程攻击者执行任意代码。

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://xinehq.de/

- 漏洞信息 (F38426)

Gentoo Linux Security Advisory 200505-19 (PacketStormID:F38426)
2005-07-02 00:00:00
Gentoo  security.gentoo.org
advisory
linux,gentoo
CVE-2005-1692
[点击下载]

Gentoo Linux Security Advisory GLSA 200505-19 - Exworm discovered that gxine insecurely implements formatted printing in the hostname decoding function. Versions less than 0.4.4 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200505-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: gxine: Format string vulnerability
      Date: May 26, 2005
      Bugs: #93532
        ID: 200505-19

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A format string vulnerability in gxine could allow a remote attacker to
execute arbitrary code.

Background
==========

gxine is a GTK+ and xine-lib based media player.

Affected packages
=================

    -------------------------------------------------------------------
     Package            /  Vulnerable  /                    Unaffected
    -------------------------------------------------------------------
  1  media-video/gxine       < 0.4.4                      *>= 0.3.3-r2
                                                          *>= 0.4.1-r1
                                                              >= 0.4.4

Description
===========

Exworm discovered that gxine insecurely implements formatted printing
in the hostname decoding function.

Impact
======

A remote attacker could entice a user to open a carefully crafted file
with gxine, possibly leading to the execution of arbitrary code.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All gxine users should upgrade to the latest available version:

    # emerge --sync
    # emerge --ask --oneshot --verbose media-video/gxine

References
==========

  [ 1 ] CAN-2005-1692
        http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1692
  [ 2 ] Bugtraq ID 13707
        http://www.securityfocus.com/bid/13707
  [ 3 ] Original Advisory
        http://www.0xbadexworm.org/adv/gxinefmt.txt

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200505-19.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

    

- 漏洞信息

16747
gxine HTTP URL Hostname Format String
Local / Remote, Context Dependent Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-05-21 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

GXINE Remote Hostname Format String Vulnerability
Input Validation Error 13707
Yes No
2005-05-22 12:00:00 2009-07-12 02:56:00
yan feng <jsk@ph4nt0m.net> is credited with the discovery of this vulnerability.

- 受影响的程序版本

xine gxine 0.4.4
xine gxine 0.4.3
+ Gentoo Linux
xine gxine 0.4.2
xine gxine 0.4.1
xine gxine 0.4 .0
Slackware Linux 10.1
Slackware Linux 10.0
Slackware Linux -current

- 漏洞讨论

Gxine is susceptible to a remote format string vulnerability. This issue is due to a failure of the application to securely implement a formatted printing function.

Successful exploitation of this vulnerability allows remote attackers to execute arbitrary machine code in the context of the affected application.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Gentoo has released advisory GLSA 200505-19 to address this issue. Gentoo updates may be applied by running the following commands as the superuser:

emerge --sync
emerge --ask --oneshot --verbose media-video/gxine

Slackware Linux has released security advisory SSA:2005-203-04 addressing this issue. Please see the referenced advisory for further information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站