Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in mplayer
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in mplayer
ID: MDVSA-2008:045
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva 2007.1, Mandriva 2008.0
Datum: Fr, 15. Februar 2008, 00:55
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0238
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630
Applikationen: MPlayer

Originalnachricht

This is a multi-part message in MIME format...

------------=_1203033344-4794-10222


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:045
http://www.mandriva.com/security/
_______________________________________________________________________

Package : mplayer
Date : February 14, 2008
Affected: 2007.1, 2008.0, Corporate 3.0
_______________________________________________________________________

Problem Description:

Heap-based buffer overflow in the rmff_dump_cont function in
input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote
attackers to execute arbitrary code via the SDP Abstract attribute,
related to the rmff_dump_header function and related to disregarding
the max field. Although originally a xine-lib issue, also affects
MPlayer due to code similarity. (CVE-2008-0225)

Multiple heap-based buffer overflows in the rmff_dump_cont function
in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers
to execute arbitrary code via the SDP (1) Title, (2) Author, or
(3) Copyright attribute, related to the rmff_dump_header function,
different vectors than CVE-2008-0225. Although originally a xine-lib
issue, also affects MPlayer due to code similarity. (CVE-2008-0238)

Array index error in libmpdemux/demux_mov.c in MPlayer 1.0 rc2 and
earlier might allow remote attackers to execute arbitrary code via
a QuickTime MOV file with a crafted stsc atom tag. (CVE-2008-0485)

Array index vulnerability in libmpdemux/demux_audio.c in MPlayer
1.0rc2 and SVN before r25917, and possibly earlier versions, as
used in Xine-lib 1.1.10, might allow remote attackers to execute
arbitrary code via a crafted FLAC tag, which triggers a buffer
overflow. (CVE-2008-0486)

Buffer overflow in stream_cddb.c in MPlayer 1.0rc2 and SVN
before r25824 allows remote user-assisted attackers to execute
arbitrary code via a CDDB database entry containing a long album
title. (CVE-2008-0629)

Buffer overflow in url.c in MPlayer 1.0rc2 and SVN before r25823 allows
remote attackers to execute arbitrary code via a crafted URL that
prevents the IPv6 parsing code from setting a pointer to NULL, which
causes the buffer to be reused by the unescape code. (CVE-2008-0630)

The updated packages have been patched to prevent these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0238
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
bc4d94bebd6e6d3f5ae8939c2a6eae17
2007.1/i586/libdha1.0-1.0-1.rc1.11.5mdv2007.1.i586.rpm
7b01d664225bcb1bd474dfd97d3e50a3
2007.1/i586/mencoder-1.0-1.rc1.11.5mdv2007.1.i586.rpm
b1258431ee88be325c9c407b0ae238ae
2007.1/i586/mplayer-1.0-1.rc1.11.5mdv2007.1.i586.rpm
9ac91fe253b625a24f03613912eaf905
2007.1/i586/mplayer-doc-1.0-1.rc1.11.5mdv2007.1.i586.rpm
e674dc2f80cfb01a3d58e1f323bf028e
2007.1/i586/mplayer-gui-1.0-1.rc1.11.5mdv2007.1.i586.rpm
f6c93fbb2298603dcadfcc199e920f4c
2007.1/SRPMS/mplayer-1.0-1.rc1.11.5mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
8e8356ef4f1d82350b2ec4603e9c97ab
2007.1/x86_64/mencoder-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm
24cbb105fc1b2d538a291635af1175f5
2007.1/x86_64/mplayer-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm
270d9a22d97b311808be80b25b9e0d46
2007.1/x86_64/mplayer-doc-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm
b895f7c06b55b182aef4a077f842574f
2007.1/x86_64/mplayer-gui-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm
f6c93fbb2298603dcadfcc199e920f4c
2007.1/SRPMS/mplayer-1.0-1.rc1.11.5mdv2007.1.src.rpm

Mandriva Linux 2008.0:
f58551219080f3ac3893b996276e24e0
2008.0/i586/libdha1.0-1.0-1.rc1.20.2mdv2008.0.i586.rpm
edc7b645e0da4e96761cfb4277f00e3d
2008.0/i586/mencoder-1.0-1.rc1.20.2mdv2008.0.i586.rpm
2b89bc02908f421c2e18771abbb009a0
2008.0/i586/mplayer-1.0-1.rc1.20.2mdv2008.0.i586.rpm
e9ec1a063f1b0f6e63efbfc14c65f95e
2008.0/i586/mplayer-doc-1.0-1.rc1.20.2mdv2008.0.i586.rpm
b43c4c4705f12fad0c612f188b84f3ba
2008.0/i586/mplayer-gui-1.0-1.rc1.20.2mdv2008.0.i586.rpm
5776eb9afddc671d323ca44c8b7d3efb
2008.0/SRPMS/mplayer-1.0-1.rc1.20.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
e5f6acd329239d27ba4e89300d54046d
2008.0/x86_64/mencoder-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm
8af0e97fa75444467bb187ba73f0fa14
2008.0/x86_64/mplayer-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm
3fa2fd143c74b1210bf8d49b22e3996f
2008.0/x86_64/mplayer-doc-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm
fd53467bec0513eab96b672777c5a0c5
2008.0/x86_64/mplayer-gui-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm
5776eb9afddc671d323ca44c8b7d3efb
2008.0/SRPMS/mplayer-1.0-1.rc1.20.2mdv2008.0.src.rpm

Corporate 3.0:
65ce689c4bdc14b5ae19697ea685b469
corporate/3.0/i586/libdha0.1-1.0-0.pre3.14.14.C30mdk.i586.rpm
908d34d7373434280d7e384745f11509
corporate/3.0/i586/libpostproc0-1.0-0.pre3.14.14.C30mdk.i586.rpm
9394b4a56ac7879785ba3ba3b40cf2e4
corporate/3.0/i586/libpostproc0-devel-1.0-0.pre3.14.14.C30mdk.i586.rpm
07b4ed8181c85011191d4536f8972654
corporate/3.0/i586/mencoder-1.0-0.pre3.14.14.C30mdk.i586.rpm
6b9be8b56f7f375c3bba37786e015ce3
corporate/3.0/i586/mplayer-1.0-0.pre3.14.14.C30mdk.i586.rpm
5bb8239d3f5a93bd3b5fb6be9015b99b
corporate/3.0/i586/mplayer-gui-1.0-0.pre3.14.14.C30mdk.i586.rpm
dd4f44dc8d0aa181b7ce3c5be006ef21
corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.14.C30mdk.src.rpm

Corporate 3.0/X86_64:
3be2677a831513f23e3c223f2c0b1988
corporate/3.0/x86_64/lib64postproc0-1.0-0.pre3.14.14.C30mdk.x86_64.rpm
ef16b06b058c39529edfdb4904bfa017
corporate/3.0/x86_64/lib64postproc0-devel-1.0-0.pre3.14.14.C30mdk.x86_64.rpm
2c21398a4ca6d86f6bb464b3f4bab6bf
corporate/3.0/x86_64/mencoder-1.0-0.pre3.14.14.C30mdk.x86_64.rpm
c9b10c36682298ba5e62ec9509ed5593
corporate/3.0/x86_64/mplayer-1.0-0.pre3.14.14.C30mdk.x86_64.rpm
b6ee8f8919df04406d00b4acf349cd6d
corporate/3.0/x86_64/mplayer-gui-1.0-0.pre3.14.14.C30mdk.x86_64.rpm
dd4f44dc8d0aa181b7ce3c5be006ef21
corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.14.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHtKhxmqjQ0CJFipgRAg7aAJ4sSkQEWvOkAcqIgrMTvSNELOcehwCgjJ48
TjDGG+/w68g+rfx94Cc/Qq8=
=rh3q
-----END PGP SIGNATURE-----


------------=_1203033344-4794-10222
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1203033344-4794-10222--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung