RedHat: Critical: HelixPlayer security update

    Date03 Mar 2005
    CategoryRed Hat
    5069
    Posted ByJoe Shakespeare
    An updated HelixPlayer package that fixes two buffer overflow issues is now available. This update has been rated as having critical security impact by the Red Hat Security Response Team.
    - ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Critical: HelixPlayer security update
    Advisory ID:       RHSA-2005:271-01
    Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-271.html
    Issue date:        2005-03-03
    Updated on:        2005-03-03
    Product:           Red Hat Enterprise Linux
    CVE Names:         CAN-2005-0455 CAN-2005-0611
    - ---------------------------------------------------------------------
    
    1. Summary:
    
    An updated HelixPlayer package that fixes two buffer overflow issues is now
    available.
    
    This update has been rated as having critical security impact by the Red
    Hat Security Response Team.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux AS version 4 - i386, ppc, x86_64
    Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
    Red Hat Enterprise Linux ES version 4 - i386, x86_64
    Red Hat Enterprise Linux WS version 4 - i386, x86_64
    
    3. Problem description:
    
    HelixPlayer is a media player.
    
    A stack based buffer overflow bug was found in HelixPlayer's Synchronized
    Multimedia Integration Language (SMIL) file processor. An attacker could
    create a specially crafted SMIL file which would execute arbitrary code
    when opened by a user. The Common Vulnerabilities and Exposures project
    (cve.mitre.org) has assigned the name CAN-2005-0455 to this issue.
    
    A buffer overflow bug was found in the way HelixPlayer decodes WAV files.
    An attacker could create a specially crafted WAV file which could execute
    arbitrary code when opened by a user. The Common Vulnerabilities and
    Exposures project (cve.mitre.org) has assigned the name CAN-2005-0611 to
    this issue.
    
    All users of HelixPlayer are advised to upgrade to this updated package,
    which contains HelixPlayer 1.0.3 which is not vulnerable to these
    issues.
    
    4. Solution:
    
    Before applying this update, make sure that all previously-released
    errata relevant to your system have been applied.  Use Red Hat
    Network to download and update your packages.  To launch the Red Hat
    Update Agent, use the following command:
    
        up2date
    
    For information on how to install packages manually, refer to the
    following Web page for the System Administration or Customization
    guide specific to your system:
    
        http://www.redhat.com/docs/manuals/enterprise/
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/):
    
    150098 - CAN-2005-0455 buffer overflow in helixplayer
    150103 - CAN-2005-0611 .wav overflow in helixplayer
    
    6. RPMs required:
    
    Red Hat Enterprise Linux AS version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/HelixPlayer-1.0.3-1.src.rpm
    18433065b08278bd8a92e2593420d296  HelixPlayer-1.0.3-1.src.rpm
    
    i386:
    cab19eecbe5bb0e27eca237ee22c9ddd  HelixPlayer-1.0.3-1.i386.rpm
    
    ppc:
    49d0c209a6ce719d38c963eef42f01ff  HelixPlayer-1.0.3-1.ppc.rpm
    
    x86_64:
    cab19eecbe5bb0e27eca237ee22c9ddd  HelixPlayer-1.0.3-1.i386.rpm
    
    Red Hat Enterprise Linux Desktop version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/HelixPlayer-1.0.3-1.src.rpm
    18433065b08278bd8a92e2593420d296  HelixPlayer-1.0.3-1.src.rpm
    
    i386:
    cab19eecbe5bb0e27eca237ee22c9ddd  HelixPlayer-1.0.3-1.i386.rpm
    
    x86_64:
    cab19eecbe5bb0e27eca237ee22c9ddd  HelixPlayer-1.0.3-1.i386.rpm
    
    Red Hat Enterprise Linux ES version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/HelixPlayer-1.0.3-1.src.rpm
    18433065b08278bd8a92e2593420d296  HelixPlayer-1.0.3-1.src.rpm
    
    i386:
    cab19eecbe5bb0e27eca237ee22c9ddd  HelixPlayer-1.0.3-1.i386.rpm
    
    x86_64:
    cab19eecbe5bb0e27eca237ee22c9ddd  HelixPlayer-1.0.3-1.i386.rpm
    
    Red Hat Enterprise Linux WS version 4:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/HelixPlayer-1.0.3-1.src.rpm
    18433065b08278bd8a92e2593420d296  HelixPlayer-1.0.3-1.src.rpm
    
    i386:
    cab19eecbe5bb0e27eca237ee22c9ddd  HelixPlayer-1.0.3-1.i386.rpm
    
    x86_64:
    cab19eecbe5bb0e27eca237ee22c9ddd  HelixPlayer-1.0.3-1.i386.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and 
    details on how to verify the signature are available from
    https://www.redhat.com/security/team/key/#package
    
    7. References:
    
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0455
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0611
    
    8. Contact:
    
    The Red Hat security contact is .  More contact
    details at https://www.redhat.com/security/team/contact/
    
    Copyright 2005 Red Hat, Inc.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Have you used our RSS feeds?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    21
    radio
    [{"id":"77","title":"Yes, for articles","votes":"2","type":"x","order":"1","pct":28.57,"resources":[]},{"id":"78","title":"Yes, for advisories","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"79","title":"Hybrid that contains both","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"80","title":"No","votes":"3","type":"x","order":"4","pct":42.86,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.