summaryrefslogtreecommitdiff
blob: 2b3137006bcb936dda2242d2437445a95d665210 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200412-21">
  <title>MPlayer: Multiple overflows</title>
  <synopsis>
    Multiple overflow vulnerabilities have been found in MPlayer, potentially
    resulting in remote executing of arbitrary code.
  </synopsis>
  <product type="ebuild">MPlayer</product>
  <announced>2004-12-20</announced>
  <revised count="01">2004-12-20</revised>
  <bug>74473</bug>
  <access>remote</access>
  <affected>
    <package name="media-video/mplayer" auto="yes" arch="*">
      <unaffected range="ge">1.0_pre5-r5</unaffected>
      <vulnerable range="le">1.0_pre5-r4</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    MPlayer is a media player capable of handling multiple multimedia
    file formats.
    </p>
  </background>
  <description>
    <p>
    iDEFENSE, Ariel Berkman and the MPlayer development team found
    multiple vulnerabilities in MPlayer. These include potential heap
    overflows in Real RTSP and pnm streaming code, stack overflows in MMST
    streaming code and multiple buffer overflows in BMP demuxer and mp3lib
    code.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could craft a malicious file or design a
    malicious streaming server. Using MPlayer to view this file or connect
    to this server could trigger an overflow and execute
    attacker-controlled code.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All MPlayer users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=media-video/mplayer-1.0_pre5-r5"</code>
  </resolution>
  <references>
    <uri link="http://www.idefense.com/application/poi/display?id=168&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
    <uri link="http://www.idefense.com/application/poi/display?id=167&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
    <uri link="http://www.idefense.com/application/poi/display?id=166&amp;type=vulnerabilities">iDEFENSE Advisory</uri>
    <uri link="http://tigger.uic.edu/~jlongs2/holes/mplayer.txt">Ariel Berkman Advisory</uri>
  </references>
  <metadata tag="requester" timestamp="2004-12-19T14:28:01Z">
    koon
  </metadata>
  <metadata tag="bugReady" timestamp="2004-12-19T22:01:07Z">
    koon
  </metadata>
  <metadata tag="submitter" timestamp="2004-12-20T09:31:29Z">
    koon
  </metadata>
</glsa>