[Frugalware-security] [ FSA-205 ] mplayer

voroskoi noreply at frugalware.org
Fri Jun 8 09:53:03 CEST 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Frugalware Security Advisory                           FSA-205

Date: 2007-06-08
Package: mplayer
Vulnerable versions: <= 1.0rc1-4terminus2
Unaffected versions: >= 1.0rc1-4terminus3
Related bugreport: http://bugs.frugalware.org/task/2131
CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948

Description
===========

Secunia Research has discovered some vulnerabilities in MPlayer, which can be exploited by malicious people to compromise a user's system.
1) A boundary error within the &quot;cddb_query_parse()&quot; function in stream/stream_cddb.c when parsing album titles can be exploited to cause a stack-based buffer overflow by tricking a user into parsing malicious CDDB entries via overly long album titles. Successful exploitation allows execution of arbitrary code.
2) Boundary errors within the &quot;cddb_parse_matches_list()&quot; and &quot;cddb_read_parse()&quot; functions in stream/stream_cddb.c when parsing album and category titles can be exploited to cause stack-based buffer overflows by tricking a user into parsing malicious CDDB entries with overly long album or category titles. Successful exploitation allows execution of arbitrary code, but may require that the user connects to a malicious server.

Updated Packages
================

Check if you have mplayer installed:

	# pacman -Q mplayer

If found, then you should upgrade to the latest version:

	# pacman -Sy mplayer

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: See http://ftp.frugalware.org/pub/README.GPG for info

iD8DBQFGaQrfZ7NElSD1VhkRAlvuAJ0XTNvhv7rLqVBuQ08yhdJzVxuSeACeLg8E
Y4Thq100NKcNonMWYWFOGsw=
=RtaB
-----END PGP SIGNATURE-----


More information about the Frugalware-security mailing list