-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:045 http://www.mandriva.com/security/ _______________________________________________________________________ Package : mplayer Date : February 14, 2008 Affected: 2007.1, 2008.0, Corporate 3.0 _______________________________________________________________________ Problem Description: Heap-based buffer overflow in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 and earlier allows remote attackers to execute arbitrary code via the SDP Abstract attribute, related to the rmff_dump_header function and related to disregarding the max field. Although originally a xine-lib issue, also affects MPlayer due to code similarity. (CVE-2008-0225) Multiple heap-based buffer overflows in the rmff_dump_cont function in input/libreal/rmff.c in xine-lib 1.1.9 allow remote attackers to execute arbitrary code via the SDP (1) Title, (2) Author, or (3) Copyright attribute, related to the rmff_dump_header function, different vectors than CVE-2008-0225. Although originally a xine-lib issue, also affects MPlayer due to code similarity. (CVE-2008-0238) Array index error in libmpdemux/demux_mov.c in MPlayer 1.0 rc2 and earlier might allow remote attackers to execute arbitrary code via a QuickTime MOV file with a crafted stsc atom tag. (CVE-2008-0485) Array index vulnerability in libmpdemux/demux_audio.c in MPlayer 1.0rc2 and SVN before r25917, and possibly earlier versions, as used in Xine-lib 1.1.10, might allow remote attackers to execute arbitrary code via a crafted FLAC tag, which triggers a buffer overflow. (CVE-2008-0486) Buffer overflow in stream_cddb.c in MPlayer 1.0rc2 and SVN before r25824 allows remote user-assisted attackers to execute arbitrary code via a CDDB database entry containing a long album title. (CVE-2008-0629) Buffer overflow in url.c in MPlayer 1.0rc2 and SVN before r25823 allows remote attackers to execute arbitrary code via a crafted URL that prevents the IPv6 parsing code from setting a pointer to NULL, which causes the buffer to be reused by the unescape code. (CVE-2008-0630) The updated packages have been patched to prevent these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0225 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0238 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0485 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0486 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0629 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0630 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.1: bc4d94bebd6e6d3f5ae8939c2a6eae17 2007.1/i586/libdha1.0-1.0-1.rc1.11.5mdv2007.1.i586.rpm 7b01d664225bcb1bd474dfd97d3e50a3 2007.1/i586/mencoder-1.0-1.rc1.11.5mdv2007.1.i586.rpm b1258431ee88be325c9c407b0ae238ae 2007.1/i586/mplayer-1.0-1.rc1.11.5mdv2007.1.i586.rpm 9ac91fe253b625a24f03613912eaf905 2007.1/i586/mplayer-doc-1.0-1.rc1.11.5mdv2007.1.i586.rpm e674dc2f80cfb01a3d58e1f323bf028e 2007.1/i586/mplayer-gui-1.0-1.rc1.11.5mdv2007.1.i586.rpm f6c93fbb2298603dcadfcc199e920f4c 2007.1/SRPMS/mplayer-1.0-1.rc1.11.5mdv2007.1.src.rpm Mandriva Linux 2007.1/X86_64: 8e8356ef4f1d82350b2ec4603e9c97ab 2007.1/x86_64/mencoder-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm 24cbb105fc1b2d538a291635af1175f5 2007.1/x86_64/mplayer-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm 270d9a22d97b311808be80b25b9e0d46 2007.1/x86_64/mplayer-doc-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm b895f7c06b55b182aef4a077f842574f 2007.1/x86_64/mplayer-gui-1.0-1.rc1.11.5mdv2007.1.x86_64.rpm f6c93fbb2298603dcadfcc199e920f4c 2007.1/SRPMS/mplayer-1.0-1.rc1.11.5mdv2007.1.src.rpm Mandriva Linux 2008.0: f58551219080f3ac3893b996276e24e0 2008.0/i586/libdha1.0-1.0-1.rc1.20.2mdv2008.0.i586.rpm edc7b645e0da4e96761cfb4277f00e3d 2008.0/i586/mencoder-1.0-1.rc1.20.2mdv2008.0.i586.rpm 2b89bc02908f421c2e18771abbb009a0 2008.0/i586/mplayer-1.0-1.rc1.20.2mdv2008.0.i586.rpm e9ec1a063f1b0f6e63efbfc14c65f95e 2008.0/i586/mplayer-doc-1.0-1.rc1.20.2mdv2008.0.i586.rpm b43c4c4705f12fad0c612f188b84f3ba 2008.0/i586/mplayer-gui-1.0-1.rc1.20.2mdv2008.0.i586.rpm 5776eb9afddc671d323ca44c8b7d3efb 2008.0/SRPMS/mplayer-1.0-1.rc1.20.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: e5f6acd329239d27ba4e89300d54046d 2008.0/x86_64/mencoder-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm 8af0e97fa75444467bb187ba73f0fa14 2008.0/x86_64/mplayer-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm 3fa2fd143c74b1210bf8d49b22e3996f 2008.0/x86_64/mplayer-doc-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm fd53467bec0513eab96b672777c5a0c5 2008.0/x86_64/mplayer-gui-1.0-1.rc1.20.2mdv2008.0.x86_64.rpm 5776eb9afddc671d323ca44c8b7d3efb 2008.0/SRPMS/mplayer-1.0-1.rc1.20.2mdv2008.0.src.rpm Corporate 3.0: 65ce689c4bdc14b5ae19697ea685b469 corporate/3.0/i586/libdha0.1-1.0-0.pre3.14.14.C30mdk.i586.rpm 908d34d7373434280d7e384745f11509 corporate/3.0/i586/libpostproc0-1.0-0.pre3.14.14.C30mdk.i586.rpm 9394b4a56ac7879785ba3ba3b40cf2e4 corporate/3.0/i586/libpostproc0-devel-1.0-0.pre3.14.14.C30mdk.i586.rpm 07b4ed8181c85011191d4536f8972654 corporate/3.0/i586/mencoder-1.0-0.pre3.14.14.C30mdk.i586.rpm 6b9be8b56f7f375c3bba37786e015ce3 corporate/3.0/i586/mplayer-1.0-0.pre3.14.14.C30mdk.i586.rpm 5bb8239d3f5a93bd3b5fb6be9015b99b corporate/3.0/i586/mplayer-gui-1.0-0.pre3.14.14.C30mdk.i586.rpm dd4f44dc8d0aa181b7ce3c5be006ef21 corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.14.C30mdk.src.rpm Corporate 3.0/X86_64: 3be2677a831513f23e3c223f2c0b1988 corporate/3.0/x86_64/lib64postproc0-1.0-0.pre3.14.14.C30mdk.x86_64.rpm ef16b06b058c39529edfdb4904bfa017 corporate/3.0/x86_64/lib64postproc0-devel-1.0-0.pre3.14.14.C30mdk.x86_64.rpm 2c21398a4ca6d86f6bb464b3f4bab6bf corporate/3.0/x86_64/mencoder-1.0-0.pre3.14.14.C30mdk.x86_64.rpm c9b10c36682298ba5e62ec9509ed5593 corporate/3.0/x86_64/mplayer-1.0-0.pre3.14.14.C30mdk.x86_64.rpm b6ee8f8919df04406d00b4acf349cd6d corporate/3.0/x86_64/mplayer-gui-1.0-0.pre3.14.14.C30mdk.x86_64.rpm dd4f44dc8d0aa181b7ce3c5be006ef21 corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.14.C30mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (GNU/Linux) iD8DBQFHtKhxmqjQ0CJFipgRAg7aAJ4sSkQEWvOkAcqIgrMTvSNELOcehwCgjJ48 TjDGG+/w68g+rfx94Cc/Qq8= =rh3q -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/