blob: 5200b6ce65e6c352dc01354f0254e1e3fc35c494 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200603-03">
<title>MPlayer: Multiple integer overflows</title>
MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding that
could potentially result in the execution of arbitrary code.
<product type="ebuild">MPlayer</product>
<announced>March 04, 2006</announced>
<revised>June 21, 2006: 02</revised>
<package name="media-video/mplayer" auto="yes" arch="*">
<unaffected range="ge">1.0.20060217</unaffected>
<unaffected range="ge">1.0_pre8</unaffected>
<vulnerable range="lt">1.0.20060217</vulnerable>
MPlayer is a media player capable of handling multiple multimedia file
MPlayer makes use of the FFmpeg library, which is vulnerable to a heap
overflow in the avcodec_default_get_buffer() function discovered by
Simon Kilvington (see GLSA 200601-06). Furthermore, AFI Security
Research discovered two integer overflows in ASF file format decoding,
in the new_demux_packet() function from libmpdemux/demuxer.h and the
demux_asf_read_packet() function from libmpdemux/demux_asf.c.
<impact type="normal">
An attacker could craft a malicious media file which, when opened using
MPlayer, would lead to a heap-based buffer overflow. This could result
in the execution of arbitrary code with the permissions of the user
running MPlayer.
There is no known workaround at this time.
All MPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-video/mplayer-1.0.20060217&quot;</code>
<uri link="">CVE-2005-4048</uri>
<uri link="">CVE-2006-0579</uri>
<uri link="/security/en/glsa/glsa-200601-06.xml">GLSA 200601-06</uri>
<metadata tag="submitter" timestamp="Sat, 04 Mar 2006 11:56:49 +0000">
<metadata tag="bugReady" timestamp="Sat, 04 Mar 2006 11:56:59 +0000">