Gentoo Archives: gentoo-announce

From: Tobias Heinlein <keytoaster@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200901-07 ] MPlayer: Multiple vulnerabilities
Date: Mon, 12 Jan 2009 19:52:11
Message-Id: 496B9E10.4060307@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200901-07:02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: MPlayer: Multiple vulnerabilities
9 Date: January 12, 2009
10 Updated: January 12, 2009
11 Bugs: #231836, #239130, #251017
12 ID: 200901-07:02
13
14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
15
16 Synopsis
17 ========
18
19 Multiple vulnerabilities in MPlayer may lead to the execution of
20 arbitrary code or a Denial of Service.
21
22 Background
23 ==========
24
25 MPlayer is a media player including support for a wide range of audio
26 and video formats.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 mplayer < 1.0_rc2_p28058-r1 >= 1.0_rc2_p28058-r1
35
36 Description
37 ===========
38
39 Multiple vulnerabilities have been reported in MPlayer:
40
41 * A stack-based buffer overflow was found in the str_read_packet()
42 function in libavformat/psxstr.c when processing crafted STR files
43 that interleave audio and video sectors (CVE-2008-3162).
44
45 * Felipe Andres Manzano reported multiple integer underflows in the
46 demux_real_fill_buffer() function in demux_real.c when processing
47 crafted Real Media files that cause the stream_read() function to
48 read or write arbitrary memory (CVE-2008-3827).
49
50 * Tobias Klein reported a stack-based buffer overflow in the
51 demux_open_vqf() function in libmpdemux/demux_vqf.c when processing
52 malformed TwinVQ files (CVE-2008-5616).
53
54 Impact
55 ======
56
57 A remote attacker could entice a user to open a specially crafted STR,
58 Real Media, or TwinVQ file to execute arbitrary code or cause a Denial
59 of Service.
60
61 Workaround
62 ==========
63
64 There is no known workaround at this time.
65
66 Resolution
67 ==========
68
69 All MPlayer users should upgrade to the latest version:
70
71 # emerge --sync
72 # emerge --ask --oneshot --verbose
73 ">=media-video/mplayer-1.0_rc2_p28058-r1 "
74
75 References
76 ==========
77
78 [ 1 ] CVE-2008-3162
79 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3162
80 [ 2 ] CVE-2008-3827
81 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3827
82 [ 3 ] CVE-2008-5616
83 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616
84
85 Availability
86 ============
87
88 This GLSA and any updates to it are available for viewing at
89 the Gentoo Security Website:
90
91 http://security.gentoo.org/glsa/glsa-200901-07.xml
92
93 Concerns?
94 =========
95
96 Security is a primary focus of Gentoo Linux and ensuring the
97 confidentiality and security of our users machines is of utmost
98 importance to us. Any security concerns should be addressed to
99 security@g.o or alternatively, you may file a bug at
100 http://bugs.gentoo.org.
101
102 License
103 =======
104
105 Copyright 2009 Gentoo Foundation, Inc; referenced text
106 belongs to its owner(s).
107
108 The contents of this document are licensed under the
109 Creative Commons - Attribution / Share Alike license.
110
111 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature