Nessus Plugin #14464
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[GLSA-200403-13] Remote buffer overflow in MPlayer
- Family:
- Gentoo Local Security Checks
- Category:
- infos
- Copyright:
- (C) 2004 Michel Arboi
- Summary:
- Remote buffer overflow in MPlayer
- Version:
- $Revision: 1.1 $
- Cve_id:
- -
- Bugtraq_id:
- -
- Xrefs:
- GLSA:200403-13
- Description:
- The remote host is affected by the vulnerability described in GLSA-200403-13
(Remote buffer overflow in MPlayer)
A vulnerability exists in the MPlayer HTTP parser which may allow an
attacker to craft a special HTTP header ("Location:") which will
trick MPlayer into executing arbitrary code on the user's computer.
Impact
An attacker without privileges may exploit this vulnerability remotely,
allowing arbitrary code to be executed in order to gain unauthorized
access.
Workaround
A workaround is not currently known for this issue. All users are advised
to upgrade to the latest version MPlayer for their architecture.
References:
http://www.mplayerhq.hu/homepage/design6/news.html
Solution:
MPlayer may be upgraded as follows:
x86 and SPARC users should:
# emerge sync
# emerge -pv ">=media-video/mplayer-0.92-r1"
# emerge ">=media-video/mplayer-0.92-r1"
AMD64 users should:
# emerge sync
# emerge -pv ">=media-video/mplayer-1.0_pre2-r1"
# emerge ">=media-video/mplayer-1.0_pre2-r1"
PPC users should:
# emerge sync
# emerge -pv ">=media-video/mplayer-1.0_pre3-r2"
# emerge ">=media-video/mplayer-1.0_pre3-r2"
Risk Factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.