![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2024.0062 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2024-0062) |
Zusammenfassung: | The remote host is missing an update for the 'mplayer' package(s) announced via the MGASA-2024-0062 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'mplayer' package(s) announced via the MGASA-2024-0062 advisory. Vulnerability Insight: The MPlayer Project mencoder SVN-r38374-13.0.1 is vulnerable to Divide By Zero via the function config () of llibmpcodecs/vf_scale.c. (CVE-2022-38850) Certain The MPlayer Project products are vulnerable to Out-of-bounds Read via function read_meta_record() of mplayer/libmpdemux/asfheader.c. This affects mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1. (CVE-2022-38851) Certain The MPlayer Project products are vulnerable to Buffer Overflow via function gen_sh_video () of mplayer/libmpdemux/demux_mov.c. This affects mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1. (CVE-2022-38855) Certain The MPlayer Project products are vulnerable to Buffer Overflow via function mov_build_index() of libmpdemux/demux_mov.c. This affects mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1. (CVE-2022-38858) Certain The MPlayer Project products are vulnerable to Divide By Zero via function demux_open_avi() of libmpdemux/demux_avi.c which affects mencoder. This affects mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1. (CVE-2022-38860) The MPlayer Project mplayer SVN-r38374-13.0.1 is vulnerable to memory corruption via function free_mp_image() of libmpcodecs/mp_image.c. (CVE-2022-38861) Certain The MPlayer Project products are vulnerable to Buffer Overflow via function mp_getbits() of libmpdemux/mpeg_hdr.c which affects mencoder and mplayer. This affects mecoder SVN-r38374-13.0.1 and mplayer SVN-r38374-13.0.1. (CVE-2022-38863) Certain The MPlayer Project products are vulnerable to Buffer Overflow via the function mp_unescape03() of libmpdemux/mpeg_hdr.c. This affects mencoder SVN-r38374-13.0.1 and mplayer SVN-r38374-13.0.1. (CVE-2022-38864) Certain The MPlayer Project products are vulnerable to Divide By Zero via the function demux_avi_read_packet of libmpdemux/demux_avi.c. This affects mplyer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1. (CVE-2022-38865) Certain The MPlayer Project products are vulnerable to Buffer Overflow via read_avi_header() of libmpdemux/aviheader.c . This affects mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1. (CVE-2022-38866) Affected Software/OS: 'mplayer' package(s) on Mageia 9. Solution: Please install the updated package(s). CVSS Score: 4.9 CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-38850 https://trac.mplayerhq.hu/ticket/2399 https://lists.debian.org/debian-lts-announce/2022/12/msg00042.html Common Vulnerability Exposure (CVE) ID: CVE-2022-38851 https://trac.mplayerhq.hu/ticket/2393 Common Vulnerability Exposure (CVE) ID: CVE-2022-38855 https://trac.mplayerhq.hu/ticket/2392 Common Vulnerability Exposure (CVE) ID: CVE-2022-38858 https://trac.mplayerhq.hu/ticket/2396 Common Vulnerability Exposure (CVE) ID: CVE-2022-38860 https://trac.mplayerhq.hu/ticket/2402 Common Vulnerability Exposure (CVE) ID: CVE-2022-38861 https://trac.mplayerhq.hu/ticket/2407 Common Vulnerability Exposure (CVE) ID: CVE-2022-38863 https://trac.mplayerhq.hu/ticket/2405 Common Vulnerability Exposure (CVE) ID: CVE-2022-38864 https://trac.mplayerhq.hu/ticket/2406 Common Vulnerability Exposure (CVE) ID: CVE-2022-38865 https://trac.mplayerhq.hu/ticket/2401 Common Vulnerability Exposure (CVE) ID: CVE-2022-38866 https://trac.mplayerhq.hu/ticket/2403#comment:2 |
Copyright | Copyright (C) 2024 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |