* [gentoo-announce] GLSA: media-video/mplayer (200309-15)
@ 2003-09-29 14:22 99% Daniel Ahlberg
0 siblings, 0 replies; 1+ results
From: Daniel Ahlberg @ 2003-09-29 14:22 UTC (permalink / raw
To: gentoo-announce, bugtraq, full-disclosure
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-15
- ------------------------------------------------------------------------
PACKAGE : media-video/mplayer
SUMMARY : Buffer Overflow Vulnerability
DATE : 2003-09-27 21:37 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <=mplayer-0.91 =mplayer-1.0_pre1
FIXED VERSION : =mplayer-0.92 =mplayer-1.0_pre1-r1
GENTOO BUG ID : 29640
CVE : none that we are aware of at this time
- ------------------------------------------------------------------------
SUMMARY:
A remotely exploitable buffer overflow vulnerability was found in
MPlayer. A malicious host can craft a harmful ASX header, and trick
MPlayer into executing arbitrary code upon parsing that header.
read the full advisory at:
http://www.mplayerhq.hu/homepage/design6/news.html
SOLUTION:
It is recommended that all Gentoo Linux users who are running
media-video/mplayer upgrade to mplayer-0.92 as follows
emerge sync
emerge =media-video/mplayer-0.92
emerge clean
Additionally PaX users might want to /sbin/chpax -m /usr/bin/mplayer
- - - ---------------------------------------------------------------------
solar@gentoo.org
aliz@gentoo.org - GnuPG key is available at http://dev.gentoo.org/~aliz
- - - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/eEA1fT7nyhUpoZMRAtEeAJ9xPIFRQlixCojNLTxXbZnKc3HxogCgtfwE
FxePCaOajma2VGAWpq4YHag=
=75dn
-----END PGP SIGNATURE-----
^ permalink raw reply [relevance 99%]
Results 1-1 of 1 | reverse | options above
-- pct% links below jump to the message on this page, permalinks otherwise --
2003-09-29 14:22 99% [gentoo-announce] GLSA: media-video/mplayer (200309-15) Daniel Ahlberg
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox