Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59739
Category:Fedora Local Security Checks
Title:Fedora Core 7 FEDORA-2007-0756 (HelixPlayer)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to HelixPlayer
announced via advisory FEDORA-2007-0756.

Helix Player is an open-source media player built in the Helix
Community for consumers. Built using GTK, it plays open source formats,
like Ogg Vorbis and Theora using the powerful Helix DNA Client Media
Engine.

Update Information:

A buffer overflow flaw was discovered in the way RealPlayer and HelixPlayer handle the wallclock variable in Synchronized Multimedia Integration Language (SMIL) files.

More information regarding this flaw can be found here:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=547
ChangeLog:

* Thu Jun 28 2007 Aurelien Bompard 1:1.0.7-6
- fix bug 245838 (CVE-2007-3410)
References:

[ 1 ] Bug #245838
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245838
[ 2 ] CVE-2007-3410
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3410
Updated packages:

a270979cff90fefd8adf74e6f1dae1039d0fbdae HelixPlayer-plugin-1.0.7-6.fc7.i386.rpm
65335babaa60fd06ff46cc55fc8bff762073fa03 HelixPlayer-debuginfo-1.0.7-6.fc7.i386.rpm
afaaea61c7532366ec0ade929596a150a456ac2d HelixPlayer-1.0.7-6.fc7.i386.rpm
9e21e795c5c99950f730cc8e31220d888b6101a7 HelixPlayer-plugin-1.0.7-6.fc7.ppc.rpm
5039a5f16b6eb2cb63ea564665b70e0a3c5cc6ba HelixPlayer-debuginfo-1.0.7-6.fc7.ppc.rpm
ee2aa0d773f10c054afdba783dac7d7758ab66d1 HelixPlayer-1.0.7-6.fc7.ppc.rpm
bb8fa664c2f34c3d5e20aa957a8af6e7a5cdc1f8 HelixPlayer-1.0.7-6.fc7.src.rpm

This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://docs.fedoraproject.org/yum/.

Solution: Apply the appropriate updates.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-0756

Risk factor : Critical

CVSS Score:
9.3

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-3410
BugTraq ID: 24658
http://www.securityfocus.com/bid/24658
CERT/CC vulnerability note: VU#770904
http://www.kb.cert.org/vuls/id/770904
http://security.gentoo.org/glsa/glsa-200709-05.xml
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=547
http://osvdb.org/37374
http://osvdb.org/38342
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10554
http://www.redhat.com/support/errata/RHSA-2007-0605.html
http://www.redhat.com/support/errata/RHSA-2007-0841.html
http://securitytracker.com/id?1018297
http://securitytracker.com/id?1018299
http://secunia.com/advisories/25819
http://secunia.com/advisories/25859
http://secunia.com/advisories/26463
http://secunia.com/advisories/26828
http://secunia.com/advisories/27361
http://www.attrition.org/pipermail/vim/2007-October/001841.html
http://www.vupen.com/english/advisories/2007/2339
http://www.vupen.com/english/advisories/2007/3628
XForce ISS Database: realplayer-smiltime-wallclockvalue-bo(35088)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35088
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.