Discover Government News

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200603-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: MPlayer: Multiple integer overflows
      Date: March 04, 2006
      Bugs: #115760, #122029
        ID: 200603-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======
MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding
that could potentially result in the execution of arbitrary code.

Background
=========
MPlayer is a media player capable of handling multiple multimedia file
formats.

Affected packages
================
    -------------------------------------------------------------------
     Package              /    Vulnerable    /              Unaffected
    -------------------------------------------------------------------
  1  media-video/mplayer     < 1.0.20060217            >= 1.0.20060217

Description
==========
MPlayer makes use of the FFmpeg library, which is vulnerable to a heap
overflow in the avcodec_default_get_buffer() function discovered by
Simon Kilvington (see GLSA 200601-06). Furthermore, AFI Security
Research discovered two integer overflows in ASF file format decoding,
in the new_demux_packet() function from libmpdemux/demuxer.h and the
demux_asf_read_packet() function from libmpdemux/demux_asf.c.

Impact
=====
An attacker could craft a malicious media file which, when opened using
MPlayer, would lead to a heap-based buffer overflow. This could result
in the execution of arbitrary code with the permissions of the user
running MPlayer.

Workaround
=========
There is no known workaround at this time.

Resolution
=========
All MPlayer users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20060217"

References
=========
  [ 1 ] CVE-2005-4048
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048
  [ 2 ] CVE-2006-0579
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0579
  [ 3 ] GLSA 200601-06
        https://security.gentoo.org/glsa/200601-06

Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  https://security.gentoo.org/glsa/200603-03

Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org/.

License
======
Copyright 2006 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.0/

Gentoo: GLSA-200603-03: MPlayer: Multiple integer overflows

MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding that could potentially result in the execution of arbitrary code.

Summary

Gentoo Linux Security Advisory GLSA 200603-03 https://security.gentoo.org/ Severity: Normal Title: MPlayer: Multiple integer overflows Date: March 04, 2006 Bugs: #115760, #122029 ID: 200603-03

Synopsis ======= MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding that could potentially result in the execution of arbitrary code.
Background ========= MPlayer is a media player capable of handling multiple multimedia file formats.
Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 media-video/mplayer < 1.0.20060217 >= 1.0.20060217
========== MPlayer makes use of the FFmpeg library, which is vulnerable to a heap overflow in the avcodec_default_get_buffer() function discovered by Simon Kilvington (see GLSA 200601-06). Furthermore, AFI Security Research discovered two integer overflows in ASF file format decoding, in the new_demux_packet() function from libmpdemux/demuxer.h and the demux_asf_read_packet() function from libmpdemux/demux_asf.c.
Impact ===== An attacker could craft a malicious media file which, when opened using MPlayer, would lead to a heap-based buffer overflow. This could result in the execution of arbitrary code with the permissions of the user running MPlayer.
Workaround ========= There is no known workaround at this time.
Resolution ========= All MPlayer users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20060217"
References ========= [ 1 ] CVE-2005-4048 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048 [ 2 ] CVE-2006-0579 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0579 [ 3 ] GLSA 200601-06 https://security.gentoo.org/glsa/200601-06
Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/200603-03
Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org/.
License ====== Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.0/

Resolution

References

Availability

Concerns

Severity

Synopsis

Background

Affected Packages

Impact

Workaround

Related News