[Frugalware-darcs] homepage-ng: FSA205-mplayer

voroskoi voroskoi at frugalware.org
Fri Jun 8 09:53:05 CEST 2007


Darcsweb-Url: http://darcs.frugalware.org/darcsweb/darcsweb.cgi?r=homepage-ng;a=darcs_commitdiff;h=20070608074517-dd049-f46e420d35d75ef53faea0de6a1db5a4be3551ab.gz;

[FSA205-mplayer
voroskoi <voroskoi at frugalware.org>**20070608074517] {
hunk ./frugalware/xml/security.xml 29
+	<fsa>
+		<id>205</id>
+		<date>2007-06-08</date>
+		<author>voroskoi</author>
+		<package>mplayer</package>
+		<vulnerable>1.0rc1-4terminus2</vulnerable>
+		<unaffected>1.0rc1-4terminus3</unaffected>
+		<bts>http://bugs.frugalware.org/task/2131</bts>
+		<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2948</cve>
+		<desc>Secunia Research has discovered some vulnerabilities in MPlayer, which can be exploited by malicious people to compromise a user's system.
+			1) A boundary error within the "cddb_query_parse()" function in stream/stream_cddb.c when parsing album titles can be exploited to cause a stack-based buffer overflow by tricking a user into parsing malicious CDDB entries via overly long album titles. Successful exploitation allows execution of arbitrary code.
+			2) Boundary errors within the "cddb_parse_matches_list()" and "cddb_read_parse()" functions in stream/stream_cddb.c when parsing album and category titles can be exploited to cause stack-based buffer overflows by tricking a user into parsing malicious CDDB entries with overly long album or category titles. Successful exploitation allows execution of arbitrary code, but may require that the user connects to a malicious server.</desc>
+	</fsa>
}


More information about the Frugalware-darcs mailing list