Login
Newsletter
Werbung

Sicherheit: Pufferüberläufe in helixplayer
Aktuelle Meldungen Distributionen
Name: Pufferüberläufe in helixplayer
ID: RHSA-2005:271-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Fr, 4. März 2005, 12:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0611
Applikationen: Helix Player Project

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Critical: HelixPlayer security update
Advisory ID: RHSA-2005:271-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-271.html
Issue date: 2005-03-03
Updated on: 2005-03-03
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0455 CAN-2005-0611
---------------------------------------------------------------------

1. Summary:

An updated HelixPlayer package that fixes two buffer overflow issues is now
available.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ppc, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, x86_64
Red Hat Enterprise Linux WS version 4 - i386, x86_64

3. Problem description:

HelixPlayer is a media player.

A stack based buffer overflow bug was found in HelixPlayer's Synchronized
Multimedia Integration Language (SMIL) file processor. An attacker could
create a specially crafted SMIL file which would execute arbitrary code
when opened by a user. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0455 to this issue.

A buffer overflow bug was found in the way HelixPlayer decodes WAV files.
An attacker could create a specially crafted WAV file which could execute
arbitrary code when opened by a user. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-0611 to
this issue.

All users of HelixPlayer are advised to upgrade to this updated package,
which contains HelixPlayer 1.0.3 which is not vulnerable to these
issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

150098 - CAN-2005-0455 buffer overflow in helixplayer
150103 - CAN-2005-0611 .wav overflow in helixplayer

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/HelixPlayer-1.0.3-1.src.rpm
18433065b08278bd8a92e2593420d296 HelixPlayer-1.0.3-1.src.rpm

i386:
cab19eecbe5bb0e27eca237ee22c9ddd HelixPlayer-1.0.3-1.i386.rpm

ppc:
49d0c209a6ce719d38c963eef42f01ff HelixPlayer-1.0.3-1.ppc.rpm

x86_64:
cab19eecbe5bb0e27eca237ee22c9ddd HelixPlayer-1.0.3-1.i386.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
HelixPlayer-1.0.3-1.src.rpm
18433065b08278bd8a92e2593420d296 HelixPlayer-1.0.3-1.src.rpm

i386:
cab19eecbe5bb0e27eca237ee22c9ddd HelixPlayer-1.0.3-1.i386.rpm

x86_64:
cab19eecbe5bb0e27eca237ee22c9ddd HelixPlayer-1.0.3-1.i386.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/HelixPlayer-1.0.3-1.src.rpm
18433065b08278bd8a92e2593420d296 HelixPlayer-1.0.3-1.src.rpm

i386:
cab19eecbe5bb0e27eca237ee22c9ddd HelixPlayer-1.0.3-1.i386.rpm

x86_64:
cab19eecbe5bb0e27eca237ee22c9ddd HelixPlayer-1.0.3-1.i386.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/HelixPlayer-1.0.3-1.src.rpm
18433065b08278bd8a92e2593420d296 HelixPlayer-1.0.3-1.src.rpm

i386:
cab19eecbe5bb0e27eca237ee22c9ddd HelixPlayer-1.0.3-1.i386.rpm

x86_64:
cab19eecbe5bb0e27eca237ee22c9ddd HelixPlayer-1.0.3-1.i386.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0455
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0611

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCJ26TXlSAg2UNWIIRAjE9AJ4jKZjQwv8kruZyZRsfHloJaRGTAACgo0uD
pB3yCUZ7LfuGKwpK9kWLWg8=
=ReLp
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung