|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200403-13] Remote buffer overflow in MPlayer Vulnerability Scan
Vulnerability Scan Summary Remote buffer overflow in MPlayer
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200403-13
(Remote buffer overflow in MPlayer)
A vulnerability exists in the MPlayer HTTP parser which may allow an
attacker to craft a special HTTP header ("Location:") which will
trick MPlayer into executing arbitrary code on the user's computer.
Impact
A possible hacker without rights may exploit this vulnerability remotely,
allowing arbitrary code to be executed in order to gain unauthorized
access.
Workaround
A workaround is not currently known for this issue. All users are advised
to upgrade to the latest version MPlayer for their architecture.
References:
http://www.mplayerhq.hu/homepage/design6/news.html
Solution:
MPlayer may be upgraded as follows:
x86 and SPARC users should:
# emerge sync
# emerge -pv ">=media-video/mplayer-0.92-r1"
# emerge ">=media-video/mplayer-0.92-r1"
AMD64 users should:
# emerge sync
# emerge -pv ">=media-video/mplayer-1.0_pre2-r1"
# emerge ">=media-video/mplayer-1.0_pre2-r1"
PPC users should:
# emerge sync
# emerge -pv ">=media-video/mplayer-1.0_pre3-r2"
# emerge ">=media-video/mplayer-1.0_pre3-r2"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|