Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
MPlayer: Multiple overflows
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200412-21
(MPlayer: Multiple overflows)
iDEFENSE, Ariel Berkman and the MPlayer development team found
multiple vulnerabilities in MPlayer. These include potential heap
overflows in Real RTSP and pnm streaming code, stack overflows in MMST
streaming code and multiple buffer overflows in BMP demuxer and mp3lib
A remote attacker could craft a malicious file or design a
malicious streaming server. Using MPlayer to view this file or connect
to this server could trigger an overflow and execute
There is no known workaround at this time.
All MPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre5-r5"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|Dell PowerEdge M630 Blade 2x E5-2660 v3 128GB, 2x 146GB 15K SAS, H730, 57810-k
|Dell PowerEdge M630 Blade 2x E5-2660 v3 64GB 2x 600GB 10K 12Gb/s, H730, 57810-k
|HP ProLiant BL680c G5 Blade 4xSix-Core Xeon 2.66GHz + 80GB RAM + 2x600GB SAS
|DELL POWEREDGE M620 REF TWO E5-2620V2 2.10GHZ 64GB 250GB SATA H710
No Discussions have been posted on this vulnerability.