drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in Realplayer
Name: |
Pufferüberlauf in Realplayer |
|
ID: |
TLSA-2006-14 |
|
Distribution: |
TurboLinux |
|
Plattformen: |
Turbolinux FUJI |
|
Datum: |
Mi, 2. August 2006, 03:50 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0323 |
|
Applikationen: |
RealPlayer |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
-------------------------------------------------------------------------- Turbolinux Security Advisory TLSA-2006-14 http://www.turbolinux.co.jp/security/ security-team@turbolinux.co.jp --------------------------------------------------------------------------
Original released date: 19 Jul 2006 Last revised: 19 Jul 2006
Package: Realplayer
Summary: Buffer overflow
More information: RealPlayer is a media player providing solid media playback locally and via streaming. A vulnerability in the manner in which Realplayer handles SWF file.
Impact: This vulnerability may allow attackers to execute arbitrary code via malformed SWF files.
Affected Products: - Turbolinux FUJI
<Turbolinux FUJI>
Source Packages Size: MD5
Binary Packages Size: MD5
RealPlayer-10.0.7-1TL1.i586.rpm 6633959 b59ebacf89a0a832237b90fb7204412e
References:
CVE [CAN-2006-0323] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-0323
-------------------------------------------------------------------------- Revision History 19 Jul 2006 Initial release --------------------------------------------------------------------------
Copyright(C) 2006 Turbolinux, Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux)
iD8DBQFEvey/K0LzjOqIJMwRAmsWAKCaejeZf0D0RyMm9rSItCVzkSdAxQCeMs8u Q954HwPLOa3IeZq60lQ4Vfw= =eJrG -----END PGP SIGNATURE-----
|
|
|
|