Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2006:048: mplayer


Vulnerability Assessment Details

MDKSA-2006:048: mplayer

Vulnerability Assessment Summary
Check for the version of the mplayer package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2006:048 (mplayer).



Multiple integer overflows in (1) the new_demux_packet function in demuxer.h
and (2) the demux_asf_read_packet function in demux_asf.c in MPlayer
1.0pre7try2 and earlier permit remote attackers to execute arbitrary code via an
ASF file with a large packet length value. The updated packages have been
patched to prevent this problem.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:048
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

DIGITAL DEC Celebris GL-5133-ST MODEL: 963WW Intel Pentium Vintage #2 ASVCC
$899.99
DIGITAL DEC Celebris GL-5133-ST MODEL: 963WW Intel Pentium Vintage #2 ASVCC pictureVintage manual: VT102 Video Terminal User Guide
$6.0
Vintage manual: VT102 Video Terminal User Guide pictureVintage manual: LA36/LA35 DECwriter II User's Manual, 2nd edition + brochure
$6.0
Vintage manual: LA36/LA35 DECwriter II User's Manual, 2nd edition + brochure pictureDEC M8639 RDRX DISK CONTROLLER PDP-11 VINTAGE COMPUTER +++
$9.99
DEC M8639 RDRX DISK CONTROLLER PDP-11 VINTAGE COMPUTER +++ picture


Discussions

No Discussions have been posted on this vulnerability.