Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
MPlayer: Multiple overflows
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200412-21
(MPlayer: Multiple overflows)
iDEFENSE, Ariel Berkman and the MPlayer development team found
multiple vulnerabilities in MPlayer. These include potential heap
overflows in Real RTSP and pnm streaming code, stack overflows in MMST
streaming code and multiple buffer overflows in BMP demuxer and mp3lib
A remote attacker could craft a malicious file or design a
malicious streaming server. Using MPlayer to view this file or connect
to this server could trigger an overflow and execute
There is no known workaround at this time.
All MPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre5-r5"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|Crucial 2GB DDR2-667 SODIMM Memory for Mac
|C9651-60001-SR Formatter Board w/o Memory - LJ 4300 Only aka C9651-67901
|Micron 1GB PC3-8500 DDR3 1066MHz Memory Ram MT8JSF12864HZ-1G1F1
|32GB DDR3 PC12800 2x 16GB PC3-12800 1600 MHz Laptop SODIMM MEMORY RAM NEW
No Discussions have been posted on this vulnerability.