[Frugalware-security] [ FSA-205 ] mplayer
noreply at frugalware.org
Fri Jun 8 09:53:03 CEST 2007
-----BEGIN PGP SIGNED MESSAGE-----
Frugalware Security Advisory FSA-205
Vulnerable versions: <= 1.0rc1-4terminus2
Unaffected versions: >= 1.0rc1-4terminus3
Related bugreport: http://bugs.frugalware.org/task/2131
Secunia Research has discovered some vulnerabilities in MPlayer, which can be exploited by malicious people to compromise a user's system.
1) A boundary error within the "cddb_query_parse()" function in stream/stream_cddb.c when parsing album titles can be exploited to cause a stack-based buffer overflow by tricking a user into parsing malicious CDDB entries via overly long album titles. Successful exploitation allows execution of arbitrary code.
2) Boundary errors within the "cddb_parse_matches_list()" and "cddb_read_parse()" functions in stream/stream_cddb.c when parsing album and category titles can be exploited to cause stack-based buffer overflows by tricking a user into parsing malicious CDDB entries with overly long album or category titles. Successful exploitation allows execution of arbitrary code, but may require that the user connects to a malicious server.
Check if you have mplayer installed:
# pacman -Q mplayer
If found, then you should upgrade to the latest version:
# pacman -Sy mplayer
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: See http://ftp.frugalware.org/pub/README.GPG for info
-----END PGP SIGNATURE-----
More information about the Frugalware-security