lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <E1DsAWQ-0005Kg-LY@mercury.mandriva.com> Date: Tue Jul 12 03:29:29 2005 From: security at mandriva.com (Mandriva Security Team) Subject: MDKSA-2005:115 - Updated mplayer packages fix vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Update Advisory _______________________________________________________________________ Package name: mplayer Advisory ID: MDKSA-2005:115 Date: July 11th, 2005 Affected versions: 10.1, 10.2, Corporate 3.0 ______________________________________________________________________ Problem Description: Two heap overflows were discovered in mplayer's code handling the RealMedia RTSP and Microsoft Media Services streams over TCP (MMST). These vulnerabilities could allow for a malicious server to execute arbitrary code on the client computer with the permissions of the user running MPlayer. The updated packages have been patched to correct this problem. _______________________________________________________________________ References: http://www.mplayerhq.hu/homepage/design7/news.html#vuln10 http://www.mplayerhq.hu/homepage/design7/news.html#vuln11 ______________________________________________________________________ Updated Packages: Mandrakelinux 10.1: bd10af1b022eab6c708b798b788d8f8f 10.1/RPMS/libdha1.0-1.0-0.pre5.8.1.101mdk.i586.rpm 0f045ff30c496287bca8ecb70fd3f9d4 10.1/RPMS/libpostproc0-1.0-0.pre5.8.1.101mdk.i586.rpm 2d6cc0414095376592ca2f31b530e139 10.1/RPMS/libpostproc0-devel-1.0-0.pre5.8.1.101mdk.i586.rpm 083b1fd4689665cc07477f87d171d614 10.1/RPMS/mencoder-1.0-0.pre5.8.1.101mdk.i586.rpm 8428f9c5e8216dc20f92ddccbaaa906c 10.1/RPMS/mplayer-1.0-0.pre5.8.1.101mdk.i586.rpm 596d46dd4d84deda9e5b38910e4d6f78 10.1/RPMS/mplayer-gui-1.0-0.pre5.8.1.101mdk.i586.rpm b74e89d4c606c99857a5a5a4314e2cc3 10.1/SRPMS/mplayer-1.0-0.pre5.8.1.101mdk.src.rpm Mandrakelinux 10.1/X86_64: bd10af1b022eab6c708b798b788d8f8f x86_64/10.1/RPMS/libdha1.0-1.0-0.pre5.8.1.101mdk.i586.rpm 0f045ff30c496287bca8ecb70fd3f9d4 x86_64/10.1/RPMS/libpostproc0-1.0-0.pre5.8.1.101mdk.i586.rpm 2d6cc0414095376592ca2f31b530e139 x86_64/10.1/RPMS/libpostproc0-devel-1.0-0.pre5.8.1.101mdk.i586.rpm 083b1fd4689665cc07477f87d171d614 x86_64/10.1/RPMS/mencoder-1.0-0.pre5.8.1.101mdk.i586.rpm 8428f9c5e8216dc20f92ddccbaaa906c x86_64/10.1/RPMS/mplayer-1.0-0.pre5.8.1.101mdk.i586.rpm 596d46dd4d84deda9e5b38910e4d6f78 x86_64/10.1/RPMS/mplayer-gui-1.0-0.pre5.8.1.101mdk.i586.rpm b74e89d4c606c99857a5a5a4314e2cc3 x86_64/10.1/SRPMS/mplayer-1.0-0.pre5.8.1.101mdk.src.rpm Mandrakelinux 10.2: 4c177eb3a8868ef01de7f8f645a8df1e 10.2/RPMS/libdha1.0-1.0-0.pre6.8.1.102mdk.i586.rpm e1c7dbc6206e73501b30eb57effdac5a 10.2/RPMS/libpostproc0-1.0-0.pre6.8.1.102mdk.i586.rpm 2d3e70104fdb6d95895a7ee2bde6595d 10.2/RPMS/libpostproc0-devel-1.0-0.pre6.8.1.102mdk.i586.rpm 99a4599c171c4d497a846ea04ca17f69 10.2/RPMS/mencoder-1.0-0.pre6.8.1.102mdk.i586.rpm c227f20edb5d7918baf3c57bb0873821 10.2/RPMS/mplayer-1.0-0.pre6.8.1.102mdk.i586.rpm fbd9082c731f6f2c1ffb9e4f8d34b3b9 10.2/RPMS/mplayer-gui-1.0-0.pre6.8.1.102mdk.i586.rpm 99eae364cc22227fd060a30c04d16ee0 10.2/SRPMS/mplayer-1.0-0.pre6.8.1.102mdk.src.rpm Mandrakelinux 10.2/X86_64: 4fac156842e3d8128f3db891176cf5bc x86_64/10.2/RPMS/lib64postproc0-1.0-0.pre6.8.1.102mdk.x86_64.rpm 4e400c2a8eec069eb48b174dad260630 x86_64/10.2/RPMS/lib64postproc0-devel-1.0-0.pre6.8.1.102mdk.x86_64.rpm 4b6be0070a94b344a273c58a72887e09 x86_64/10.2/RPMS/mencoder-1.0-0.pre6.8.1.102mdk.x86_64.rpm 74c034b62e9a521bc1940a055ed85efa x86_64/10.2/RPMS/mplayer-1.0-0.pre6.8.1.102mdk.x86_64.rpm 939796a7a34edfd1a28ede74945f6476 x86_64/10.2/RPMS/mplayer-gui-1.0-0.pre6.8.1.102mdk.x86_64.rpm 99eae364cc22227fd060a30c04d16ee0 x86_64/10.2/SRPMS/mplayer-1.0-0.pre6.8.1.102mdk.src.rpm Corporate 3.0: d41099adcaa6d11c38e89b576cd29c0e corporate/3.0/RPMS/libdha0.1-1.0-0.pre3.14.2.C30mdk.i586.rpm 957d003a9d6a87dcef47000389cf1718 corporate/3.0/RPMS/libpostproc0-1.0-0.pre3.14.2.C30mdk.i586.rpm 2e03d433c8c85d92fd5f3b55993657a4 corporate/3.0/RPMS/libpostproc0-devel-1.0-0.pre3.14.2.C30mdk.i586.rpm c7db9472c5307cf4b2101cf85258374b corporate/3.0/RPMS/mencoder-1.0-0.pre3.14.2.C30mdk.i586.rpm 2ff16f611b2e04279d82d334d22e09b2 corporate/3.0/RPMS/mplayer-1.0-0.pre3.14.2.C30mdk.i586.rpm c893a7b1127e6a6b882f8a805197f704 corporate/3.0/RPMS/mplayer-gui-1.0-0.pre3.14.2.C30mdk.i586.rpm 33af37ca45913f9143a14c54cf599ea9 corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.2.C30mdk.src.rpm Corporate 3.0/X86_64: d56e4c1c37fc14c358679c9965a1a631 x86_64/corporate/3.0/RPMS/lib64postproc0-1.0-0.pre3.14.2.C30mdk.x86_64.rpm 855ab006ca3e953ff0b2e74dc945ec4e x86_64/corporate/3.0/RPMS/lib64postproc0-devel-1.0-0.pre3.14.2.C30mdk.x86_64.rpm 735165e505cd65f4c035778e681b4da1 x86_64/corporate/3.0/RPMS/mencoder-1.0-0.pre3.14.2.C30mdk.x86_64.rpm 0bbec21ba423cdeb16d1d3a86ce48d70 x86_64/corporate/3.0/RPMS/mplayer-1.0-0.pre3.14.2.C30mdk.x86_64.rpm 314b912d457e48b4a09ca03e94600310 x86_64/corporate/3.0/RPMS/mplayer-gui-1.0-0.pre3.14.2.C30mdk.x86_64.rpm 33af37ca45913f9143a14c54cf599ea9 x86_64/corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.2.C30mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFC0ysCmqjQ0CJFipgRAlNDAJ4lZnvklyyUurdn8Kxq3bu3R2d3eQCcDyXh yppl4sZhLzPezuTB76yx7Lw= =Vq9x -----END PGP SIGNATURE-----
Powered by blists - more mailing lists