lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: aliz at gentoo.org (Daniel Ahlberg)
Subject: GLSA:  media-video/mplayer (200309-15)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-15
- ------------------------------------------------------------------------
          PACKAGE : media-video/mplayer
          SUMMARY : Buffer Overflow Vulnerability
             DATE : 2003-09-27 21:37 UTC
          EXPLOIT : remote
VERSIONS AFFECTED : <=mplayer-0.91 =mplayer-1.0_pre1
    FIXED VERSION : =mplayer-0.92 =mplayer-1.0_pre1-r1
    GENTOO BUG ID : 29640
              CVE : none that we are aware of at this time
- ------------------------------------------------------------------------

SUMMARY:
 A remotely exploitable buffer overflow vulnerability was found in
 MPlayer. A malicious host can craft a harmful ASX header, and trick
 MPlayer into executing arbitrary code upon parsing that header.

 read the full advisory at:
  http://www.mplayerhq.hu/homepage/design6/news.html

SOLUTION:

 It is recommended that all Gentoo Linux users who are running
 media-video/mplayer upgrade to mplayer-0.92 as follows

 emerge sync
 emerge =media-video/mplayer-0.92
 emerge clean

 Additionally PaX users might want to /sbin/chpax -m /usr/bin/mplayer

- - - ---------------------------------------------------------------------
solar@...too.org
aliz@...too.org - GnuPG key is available at http://dev.gentoo.org/~aliz
- - - ---------------------------------------------------------------------

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/eEA1fT7nyhUpoZMRAtEeAJ9xPIFRQlixCojNLTxXbZnKc3HxogCgtfwE
FxePCaOajma2VGAWpq4YHag=
=75dn
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists