|
|
Message-ID: <20080929160052.GX23089@fuse.inversepath.com>
Date: Mon, 29 Sep 2008 16:00:52 +0000
From: Andrea Barisani <lcars@...rt.org>
To: ocert-announce@...ts.ocert.org, oss-security@...ts.openwall.com,
bugtraq@...urityfocus.com
Subject: [oCERT-2008-013] MPlayer Real demuxer heap overflow
2008/09/29 #2008-013 MPlayer Real demuxer heap overflow
Description:
The MPlayer multimedia player suffers from a vulnerability which could result
in arbitrary code execution and at the least, in unexpected process
termination.
Three integer underflows located in the Real demuxer code can be used to
exploit a heap overflow, a specific video file can be crafted in order to make
the stream_read function reading or writing arbitrary amounts of memory.
The following patch fixes the issue:
http://www.ocert.org/patches/2008-013/mplayer_demux_real.patch
Affected version:
MPlayer <= 1.0_rc2
Fixed version:
MPlayer, N/A
Credit: vulnerability report, patch and PoC code received from Felipe Andres
Manzano <fmanzano [at] fceia [dot] unr [dot] edu [dot] ar>.
CVE: CVE-2008-3827
Timeline:
2008-08-12: vulnerability report received
2008-08-24: contacted mplayer maintainers
2008-08-25: maintainer provides patch
2008-08-28: reporter indicates that the patch is incomplete and sends new PoC
2008-09-15: maintainer provides updated patch
2008-09-16: reporter confirms patch
2008-09-29: advisory release
References:
Links:
http://www.mplayerhq.hu
Permalink:
http://www.ocert.org/advisories/ocert-2008-013.html
--
Andrea Barisani | Founder & Project Coordinator
oCERT | Open Source Computer Emergency Response Team
<lcars@...rt.org> http://www.ocert.org
0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E
"Pluralitas non est ponenda sine necessitate"
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.