Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.60400
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDVSA-2008:045 (mplayer)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to mplayer
announced via advisory MDVSA-2008:045.

Heap-based buffer overflow in the rmff_dump_cont function in
input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote
attackers to execute arbitrary code via the SDP Abstract attribute,
related to the rmff_dump_header function and related to disregarding
the max field. Although originally a xine-lib issue, also affects
MPlayer due to code similarity. (CVE-2008-0225)

Multiple heap-based buffer overflows in the rmff_dump_cont function
in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers
to execute arbitrary code via the SDP (1) Title, (2) Author, or
(3) Copyright attribute, related to the rmff_dump_header function,
different vectors than CVE-2008-0225. Although originally a xine-lib
issue, also affects MPlayer due to code similarity. (CVE-2008-0238)

Array index error in libmpdemux/demux_mov.c in MPlayer 1.0 rc2 and
earlier might allow remote attackers to execute arbitrary code via
a QuickTime MOV file with a crafted stsc atom tag. (CVE-2008-0485)

Array index vulnerability in libmpdemux/demux_audio.c in MPlayer
1.0rc2 and SVN before r25917, and possibly earlier versions, as
used in Xine-lib 1.1.10, might allow remote attackers to execute
arbitrary code via a crafted FLAC tag, which triggers a buffer
overflow. (CVE-2008-0486)

Buffer overflow in stream_cddb.c in MPlayer 1.0rc2 and SVN
before r25824 allows remote user-assisted attackers to execute
arbitrary code via a CDDB database entry containing a long album
title. (CVE-2008-0629)

Buffer overflow in url.c in MPlayer 1.0rc2 and SVN before r25823 allows
remote attackers to execute arbitrary code via a crafted URL that
prevents the IPv6 parsing code from setting a pointer to NULL, which
causes the buffer to be reused by the unescape code. (CVE-2008-0630)

The updated packages have been patched to prevent these issues.

Affected: 2007.1, 2008.0, Corporate 3.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2008:045

Risk factor : Critical

CVSS Score:
9.3

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-0225
BugTraq ID: 27198
http://www.securityfocus.com/bid/27198
Debian Security Information: DSA-1472 (Google Search)
http://www.debian.org/security/2008/dsa-1472
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00592.html
http://security.gentoo.org/glsa/glsa-200801-12.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:020
http://www.mandriva.com/security/advisories?name=MDVSA-2008:045
http://aluigi.altervista.org/adv/xinermffhof-adv.txt
http://secunia.com/advisories/28384
http://secunia.com/advisories/28489
http://secunia.com/advisories/28507
http://secunia.com/advisories/28636
http://secunia.com/advisories/28674
http://secunia.com/advisories/28955
http://secunia.com/advisories/31393
SuSE Security Announcement: SUSE-SR:2008:002 (Google Search)
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
http://www.ubuntu.com/usn/usn-635-1
http://www.vupen.com/english/advisories/2008/0163
Common Vulnerability Exposure (CVE) ID: CVE-2008-0238
Common Vulnerability Exposure (CVE) ID: CVE-2008-0485
BugTraq ID: 27499
http://www.securityfocus.com/bid/27499
Bugtraq: 20080204 CORE-2008-0122: MPlayer arbitrary pointer dereference (Google Search)
http://www.securityfocus.com/archive/1/487500/100/0/threaded
Debian Security Information: DSA-1496 (Google Search)
http://www.debian.org/security/2008/dsa-1496
http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060032.html
http://security.gentoo.org/glsa/glsa-200803-16.xml
http://www.coresecurity.com/?action=item&id=2102
http://www.securitytracker.com/id?1019299
http://secunia.com/advisories/28779
http://secunia.com/advisories/28956
http://secunia.com/advisories/29307
http://securityreason.com/securityalert/3607
http://www.vupen.com/english/advisories/2008/0406/references
Common Vulnerability Exposure (CVE) ID: CVE-2008-0486
BugTraq ID: 27441
http://www.securityfocus.com/bid/27441
Bugtraq: 20080204 CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability (Google Search)
http://www.securityfocus.com/archive/1/487501/100/0/threaded
Debian Security Information: DSA-1536 (Google Search)
http://www.debian.org/security/2008/dsa-1536
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00395.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00442.html
http://lists.grok.org.uk/pipermail/full-disclosure/2008-February/060033.html
http://security.gentoo.org/glsa/glsa-200802-12.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:046
http://www.coresecurity.com/?action=item&id=2103
http://secunia.com/advisories/28801
http://secunia.com/advisories/28918
http://secunia.com/advisories/28989
http://secunia.com/advisories/29141
http://secunia.com/advisories/29323
http://secunia.com/advisories/29601
http://securityreason.com/securityalert/3608
SuSE Security Announcement: SUSE-SR:2008:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
http://www.vupen.com/english/advisories/2008/0421
Common Vulnerability Exposure (CVE) ID: CVE-2008-0629
BugTraq ID: 27765
http://www.securityfocus.com/bid/27765
Common Vulnerability Exposure (CVE) ID: CVE-2008-0630
BugTraq ID: 27766
http://www.securityfocus.com/bid/27766
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.