Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
MPlayer: Multiple overflows
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200412-21
(MPlayer: Multiple overflows)
iDEFENSE, Ariel Berkman and the MPlayer development team found
multiple vulnerabilities in MPlayer. These include potential heap
overflows in Real RTSP and pnm streaming code, stack overflows in MMST
streaming code and multiple buffer overflows in BMP demuxer and mp3lib
A remote attacker could craft a malicious file or design a
malicious streaming server. Using MPlayer to view this file or connect
to this server could trigger an overflow and execute
There is no known workaround at this time.
All MPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre5-r5"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|Juniper Physical Interface Module MPIM SRX-MP-1T1E1 T1 Working Pull
|New Juniper Physical Interface Module MPIM SRX-MP-1T1E1 T1 Sealed
|Juniper Ex3300-48T Managed Switch 48-Port 10/100/1000 tested for power only
No Discussions have been posted on this vulnerability.