Nessus Plugin #14464

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[GLSA-200403-13] Remote buffer overflow in MPlayer

Family:
Gentoo Local Security Checks
Category:
infos
Copyright:
(C) 2004 Michel Arboi
Summary:
Remote buffer overflow in MPlayer
Version:
$Revision: 1.1 $
Cve_id:
-
Bugtraq_id:
-
Xrefs:
GLSA:200403-13
Description:
The remote host is affected by the vulnerability described in GLSA-200403-13
(Remote buffer overflow in MPlayer)


A vulnerability exists in the MPlayer HTTP parser which may allow an
attacker to craft a special HTTP header ("Location:") which will
trick MPlayer into executing arbitrary code on the user's computer.

Impact

An attacker without privileges may exploit this vulnerability remotely,
allowing arbitrary code to be executed in order to gain unauthorized
access.

Workaround

A workaround is not currently known for this issue. All users are advised
to upgrade to the latest version MPlayer for their architecture.

References:
http://www.mplayerhq.hu/homepage/design6/news.html


Solution:
MPlayer may be upgraded as follows:
x86 and SPARC users should:
# emerge sync
# emerge -pv ">=media-video/mplayer-0.92-r1"
# emerge ">=media-video/mplayer-0.92-r1"
AMD64 users should:
# emerge sync
# emerge -pv ">=media-video/mplayer-1.0_pre2-r1"
# emerge ">=media-video/mplayer-1.0_pre2-r1"
PPC users should:
# emerge sync
# emerge -pv ">=media-video/mplayer-1.0_pre3-r2"
# emerge ">=media-video/mplayer-1.0_pre3-r2"


Risk Factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.