Date: Tue, 17 Aug 2004 18:15:28 GMT From: c0ntex <c0ntex@open-security.org> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/70584: Xine vcd:// mrl input identifier overflow Message-ID: <200408171815.i7HIFShs054409@www.freebsd.org> Resent-Message-ID: <200408171820.i7HIKJcM062203@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 70584 >Category: ports >Synopsis: Xine vcd:// mrl input identifier overflow >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Aug 17 18:20:19 GMT 2004 >Closed-Date: >Last-Modified: >Originator: c0ntex >Release: N/A >Organization: None >Environment: N/A >Description: Please peruse http://open-security.org/advisories/6 There is no freebsd machine here to test at the moment *sorry* as such I'm unable to verify 100% this issue on freebsd. I'm contacting you directly because my bugtraq post was rejected, I like freebsd so want to make sure you know. The seriousness of this bug is relative, I chose the middle path for simplicity, excuse me if it was incorrect. cheers >How-To-Repeat: Run xine against POC, sorry guys its Linux code, again due to the fact I have no freebsd machine. >Fix: Xine released a fix in CVS. URL available in advisory. >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200408171815.i7HIFShs054409>