![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.52568 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 3 FEDORA-2005-188 (HelixPlayer) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to HelixPlayer announced via advisory FEDORA-2005-188. This update has been rated as having critical security impact by the Red Hat Security Response Team. A stack based buffer overflow bug was found in HelixPlayer's Synchronized Multimedia Integration Language (SMIL) file processor. An attacker could create a specially crafted SMIL file which would execute arbitrary code when opened by a user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0455 to this issue. A buffer overflow bug was found in the way HelixPlayer decodes WAV files. An attacker could create a specially crafted WAV file which could execute arbitrary code when opened by a user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0611 to this issue. All users of HelixPlayer are advised to upgrade to this updated package, which contains HelixPlayer 1.0.3 which is not vulnerable to these issues. This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. Solution: Apply the appropriate updates. http://www.fedoranews.org/blog/index.php?p=447 Risk factor : High CVSS Score: 5.1 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-0455 http://www.idefense.com/application/poi/display?id=209&type=vulnerabilities https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10926 http://www.redhat.com/support/errata/RHSA-2005-265.html http://www.redhat.com/support/errata/RHSA-2005-271.html Common Vulnerability Exposure (CVE) ID: CVE-2005-0611 20050302 RealOne Player / Real .WAV Heap Overflow File Format Vulnerability http://marc.info/?l=bugtraq&m=110979465912834&w=2 http://marc.info/?l=vulnwatch&m=110977858619314&w=2 RHSA-2005:265 RHSA-2005:271 http://service.real.com/help/faq/security/050224_player/EN/ oval:org.mitre.oval:def:11419 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11419 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |