Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200603-03] MPlayer: Multiple integer overflows Vulnerability Scan

Vulnerability Scan Summary
MPlayer: Multiple integer overflows

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200603-03
(MPlayer: Multiple integer overflows)

MPlayer makes use of the FFmpeg library, which is vulnerable to a
heap overflow in the avcodec_default_get_buffer() function discovered
by Simon Kilvington (see GLSA 200601-06). Furthermore, AFI Security
Research discovered two integer overflows in ASF file format decoding,
in the new_demux_packet() function from libmpdemux/demuxer.h and the
demux_asf_read_packet() function from libmpdemux/demux_asf.c.


A possible hacker could craft a malicious media file which, when opened
using MPlayer, would lead to a heap-based buffer overflow. This could
result in the execution of arbitrary code with the permissions of the
user running MPlayer.


There is no known workaround at this time.


All MPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20060217"

Threat Level: Medium

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.