lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1JPnpk-0007UM-Hi@artemis.annvix.ca>
Date: Thu, 14 Feb 2008 16:49:40 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2008:045 ] - Updated MPlayer packages fix
	a few vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:045
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : mplayer
 Date    : February 14, 2008
 Affected: 2007.1, 2008.0, Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 Heap-based buffer overflow in the rmff_dump_cont function in
 input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote
 attackers to execute arbitrary code via the SDP Abstract attribute,
 related to the rmff_dump_header function and related to disregarding
 the max field. Although originally a xine-lib issue, also affects
 MPlayer due to code similarity. (CVE-2008-0225)
 
 Multiple heap-based buffer overflows in the rmff_dump_cont function
 in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers
 to execute arbitrary code via the SDP (1) Title, (2) Author, or
 (3) Copyright attribute, related to the rmff_dump_header function,
 different vectors than CVE-2008-0225. Although originally a xine-lib
 issue, also affects MPlayer due to code similarity. (CVE-2008-0238)
 
 Array index error in libmpdemux/demux_mov.c in MPlayer 1.0 rc2 and
 earlier might allow remote attackers to execute arbitrary code via
 a QuickTime MOV file with a crafted stsc atom tag. (CVE-2008-0485)
 
 Array index vulnerability in libmpdemux/demux_audio.c in MPlayer
 1.0rc2 and SVN before r25917, and possibly earlier versions, as
 used in Xine-lib 1.1.10, might allow remote attackers to execute
 arbitrary code via a crafted FLAC tag, which triggers a buffer
 overflow. (CVE-2008-0486)
 
 Buffer overflow in stream_cddb.c in MPlayer 1.0rc2 and SVN
 before r25824 allows remote user-assisted attackers to execute
 arbitrary code via a CDDB database entry containing a long album
 title. (CVE-2008-0629)
 
 Buffer overflow in url.c in MPlayer 1.0rc2 and SVN before r25823 allows
 remote attackers to execute arbitrary code via a crafted URL that
 prevents the IPv6 parsing code from setting a pointer to NULL, which
 causes the buffer to be reused by the unescape code. (CVE-2008-0630)
 
 The updated packages have been patched to prevent these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0238
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.1:
 bc4d94bebd6e6d3f5ae8939c2a6eae17  2007.1/i586/libdha1.0-1.0-1.rc1.11.5mdv2007.1.i586.rpm
 7b01d664225bcb1bd474dfd97d3e50a3  2007.1/i586/mencoder-1.0-1.rc1.11.5mdv2007.1.i586.rpm
 b1258431ee88be325c9c407b0ae238ae  2007.1/i586/mplayer-1.0-1.rc1.11.5mdv2007.1.i586.rpm
 9ac91fe253b625a24f03613912eaf905  2007.1/i586/mplayer-doc-1.0-1.rc1.11.5mdv2007.1.i586.rpm
 e674dc2f80cfb01a3d58e1f323bf028e  2007.1/i586/mplayer-gui-1.0-1.rc1.11.5mdv2007.1.i586.rpm 
 f6c93fbb2298603dcadfcc199e920f4c  2007.1/SRPMS/mplayer-1.0-1.rc1.11.5mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 8e8356ef4f1d82350b2ec4603e9c97ab  2007.1/x86_64/mencoder-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm
 24cbb105fc1b2d538a291635af1175f5  2007.1/x86_64/mplayer-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm
 270d9a22d97b311808be80b25b9e0d46  2007.1/x86_64/mplayer-doc-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm
 b895f7c06b55b182aef4a077f842574f  2007.1/x86_64/mplayer-gui-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm 
 f6c93fbb2298603dcadfcc199e920f4c  2007.1/SRPMS/mplayer-1.0-1.rc1.11.5mdv2007.1.src.rpm

 Mandriva Linux 2008.0:
 f58551219080f3ac3893b996276e24e0  2008.0/i586/libdha1.0-1.0-1.rc1.20.2mdv2008.0.i586.rpm
 edc7b645e0da4e96761cfb4277f00e3d  2008.0/i586/mencoder-1.0-1.rc1.20.2mdv2008.0.i586.rpm
 2b89bc02908f421c2e18771abbb009a0  2008.0/i586/mplayer-1.0-1.rc1.20.2mdv2008.0.i586.rpm
 e9ec1a063f1b0f6e63efbfc14c65f95e  2008.0/i586/mplayer-doc-1.0-1.rc1.20.2mdv2008.0.i586.rpm
 b43c4c4705f12fad0c612f188b84f3ba  2008.0/i586/mplayer-gui-1.0-1.rc1.20.2mdv2008.0.i586.rpm 
 5776eb9afddc671d323ca44c8b7d3efb  2008.0/SRPMS/mplayer-1.0-1.rc1.20.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 e5f6acd329239d27ba4e89300d54046d  2008.0/x86_64/mencoder-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm
 8af0e97fa75444467bb187ba73f0fa14  2008.0/x86_64/mplayer-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm
 3fa2fd143c74b1210bf8d49b22e3996f  2008.0/x86_64/mplayer-doc-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm
 fd53467bec0513eab96b672777c5a0c5  2008.0/x86_64/mplayer-gui-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm 
 5776eb9afddc671d323ca44c8b7d3efb  2008.0/SRPMS/mplayer-1.0-1.rc1.20.2mdv2008.0.src.rpm

 Corporate 3.0:
 65ce689c4bdc14b5ae19697ea685b469  corporate/3.0/i586/libdha0.1-1.0-0.pre3.14.14.C30mdk.i586.rpm
 908d34d7373434280d7e384745f11509  corporate/3.0/i586/libpostproc0-1.0-0.pre3.14.14.C30mdk.i586.rpm
 9394b4a56ac7879785ba3ba3b40cf2e4  corporate/3.0/i586/libpostproc0-devel-1.0-0.pre3.14.14.C30mdk.i586.rpm
 07b4ed8181c85011191d4536f8972654  corporate/3.0/i586/mencoder-1.0-0.pre3.14.14.C30mdk.i586.rpm
 6b9be8b56f7f375c3bba37786e015ce3  corporate/3.0/i586/mplayer-1.0-0.pre3.14.14.C30mdk.i586.rpm
 5bb8239d3f5a93bd3b5fb6be9015b99b  corporate/3.0/i586/mplayer-gui-1.0-0.pre3.14.14.C30mdk.i586.rpm 
 dd4f44dc8d0aa181b7ce3c5be006ef21  corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.14.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 3be2677a831513f23e3c223f2c0b1988  corporate/3.0/x86_64/lib64postproc0-1.0-0.pre3.14.14.C30mdk.x86_64.rpm
 ef16b06b058c39529edfdb4904bfa017  corporate/3.0/x86_64/lib64postproc0-devel-1.0-0.pre3.14.14.C30mdk.x86_64.rpm
 2c21398a4ca6d86f6bb464b3f4bab6bf  corporate/3.0/x86_64/mencoder-1.0-0.pre3.14.14.C30mdk.x86_64.rpm
 c9b10c36682298ba5e62ec9509ed5593  corporate/3.0/x86_64/mplayer-1.0-0.pre3.14.14.C30mdk.x86_64.rpm
 b6ee8f8919df04406d00b4acf349cd6d  corporate/3.0/x86_64/mplayer-gui-1.0-0.pre3.14.14.C30mdk.x86_64.rpm 
 dd4f44dc8d0aa181b7ce3c5be006ef21  corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.14.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHtKhxmqjQ0CJFipgRAg7aAJ4sSkQEWvOkAcqIgrMTvSNELOcehwCgjJ48
TjDGG+/w68g+rfx94Cc/Qq8=
=rh3q
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ