blob: a3dbc4031f0487a876e37dea12a0909e96ca6d4e [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200608-24">
<title>AlsaPlayer: Multiple buffer overflows</title>
AlsaPlayer is vulnerable to multiple buffer overflows which could lead to
the execution of arbitrary code.
<product type="ebuild">AlsaPlayer</product>
<announced>August 26, 2006</announced>
<revised>August 26, 2006: 01</revised>
<package name="media-sound/alsaplayer" auto="yes" arch="*">
<vulnerable range="le">0.99.76-r3</vulnerable>
AlsaPlayer is a heavily multithreaded PCM player that tries to utilize
ALSA utilities and drivers. As of June 2004, the project is inactive.
AlsaPlayer contains three buffer overflows: in the function that
handles the HTTP connections, the GTK interface, and the CDDB querying
<impact type="normal">
An attacker could exploit the first vulnerability by enticing a user to
load a malicious URL resulting in the execution of arbitrary code with
the permissions of the user running AlsaPlayer.
There is no known workaround at this time.
AlsaPlayer has been masked in Portage pending the resolution of these
issues. AlsaPlayer users are advised to uninstall the package until
further notice:
# emerge --ask --unmerge &quot;media-sound/alsaplayer&quot;</code>
<uri link="">CVE-2006-4089</uri>
<metadata tag="requester" timestamp="Fri, 18 Aug 2006 15:04:43 +0000">
<metadata tag="submitter" timestamp="Fri, 18 Aug 2006 21:34:55 +0000">
<metadata tag="bugReady" timestamp="Fri, 18 Aug 2006 21:40:51 +0000">