Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2024.0062
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2024-0062)
Zusammenfassung:The remote host is missing an update for the 'mplayer' package(s) announced via the MGASA-2024-0062 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'mplayer' package(s) announced via the MGASA-2024-0062 advisory.

Vulnerability Insight:
The MPlayer Project mencoder SVN-r38374-13.0.1 is vulnerable to Divide
By Zero via the function config () of llibmpcodecs/vf_scale.c.
(CVE-2022-38850)
Certain The MPlayer Project products are vulnerable to Out-of-bounds
Read via function read_meta_record() of mplayer/libmpdemux/asfheader.c.
This affects mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1.
(CVE-2022-38851)
Certain The MPlayer Project products are vulnerable to Buffer Overflow
via function gen_sh_video () of mplayer/libmpdemux/demux_mov.c. This
affects mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1.
(CVE-2022-38855)
Certain The MPlayer Project products are vulnerable to Buffer Overflow
via function mov_build_index() of libmpdemux/demux_mov.c. This affects
mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1.
(CVE-2022-38858)
Certain The MPlayer Project products are vulnerable to Divide By Zero
via function demux_open_avi() of libmpdemux/demux_avi.c which affects
mencoder. This affects mplayer SVN-r38374-13.0.1 and mencoder
SVN-r38374-13.0.1. (CVE-2022-38860)
The MPlayer Project mplayer SVN-r38374-13.0.1 is vulnerable to memory
corruption via function free_mp_image() of libmpcodecs/mp_image.c.
(CVE-2022-38861)
Certain The MPlayer Project products are vulnerable to Buffer Overflow
via function mp_getbits() of libmpdemux/mpeg_hdr.c which affects
mencoder and mplayer. This affects mecoder SVN-r38374-13.0.1 and mplayer
SVN-r38374-13.0.1. (CVE-2022-38863)
Certain The MPlayer Project products are vulnerable to Buffer Overflow
via the function mp_unescape03() of libmpdemux/mpeg_hdr.c. This affects
mencoder SVN-r38374-13.0.1 and mplayer SVN-r38374-13.0.1.
(CVE-2022-38864)
Certain The MPlayer Project products are vulnerable to Divide By Zero
via the function demux_avi_read_packet of libmpdemux/demux_avi.c. This
affects mplyer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1.
(CVE-2022-38865)
Certain The MPlayer Project products are vulnerable to Buffer Overflow
via read_avi_header() of libmpdemux/aviheader.c . This affects mplayer
SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1. (CVE-2022-38866)

Affected Software/OS:
'mplayer' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-38850
https://trac.mplayerhq.hu/ticket/2399
https://lists.debian.org/debian-lts-announce/2022/12/msg00042.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-38851
https://trac.mplayerhq.hu/ticket/2393
Common Vulnerability Exposure (CVE) ID: CVE-2022-38855
https://trac.mplayerhq.hu/ticket/2392
Common Vulnerability Exposure (CVE) ID: CVE-2022-38858
https://trac.mplayerhq.hu/ticket/2396
Common Vulnerability Exposure (CVE) ID: CVE-2022-38860
https://trac.mplayerhq.hu/ticket/2402
Common Vulnerability Exposure (CVE) ID: CVE-2022-38861
https://trac.mplayerhq.hu/ticket/2407
Common Vulnerability Exposure (CVE) ID: CVE-2022-38863
https://trac.mplayerhq.hu/ticket/2405
Common Vulnerability Exposure (CVE) ID: CVE-2022-38864
https://trac.mplayerhq.hu/ticket/2406
Common Vulnerability Exposure (CVE) ID: CVE-2022-38865
https://trac.mplayerhq.hu/ticket/2401
Common Vulnerability Exposure (CVE) ID: CVE-2022-38866
https://trac.mplayerhq.hu/ticket/2403#comment:2
CopyrightCopyright (C) 2024 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.