Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in Realplayer
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in Realplayer
ID: TLSA-2006-14
Distribution: TurboLinux
Plattformen: Turbolinux FUJI
Datum: Mi, 2. August 2006, 03:50
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0323
Applikationen: RealPlayer

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

--------------------------------------------------------------------------
Turbolinux Security Advisory TLSA-2006-14
http://www.turbolinux.co.jp/security/
security-team@turbolinux.co.jp
--------------------------------------------------------------------------

Original released date: 19 Jul 2006
Last revised: 19 Jul 2006

Package: Realplayer

Summary: Buffer overflow

More information:
RealPlayer is a media player providing solid media playback locally and via
streaming.
A vulnerability in the manner in which Realplayer handles SWF file.

Impact:
This vulnerability may allow attackers to execute arbitrary code via
malformed SWF files.

Affected Products:
- Turbolinux FUJI


<Turbolinux FUJI>

Source Packages
Size: MD5


Binary Packages
Size: MD5

RealPlayer-10.0.7-1TL1.i586.rpm
6633959 b59ebacf89a0a832237b90fb7204412e


References:

CVE
[CAN-2006-0323]
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-0323

--------------------------------------------------------------------------
Revision History
19 Jul 2006 Initial release
--------------------------------------------------------------------------

Copyright(C) 2006 Turbolinux, Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFEvey/K0LzjOqIJMwRAmsWAKCaejeZf0D0RyMm9rSItCVzkSdAxQCeMs8u
Q954HwPLOa3IeZq60lQ4Vfw=
=eJrG
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung