Lucene search

K
gentooGentoo FoundationGLSA-200509-01
HistorySep 01, 2005 - 12:00 a.m.

MPlayer: Heap overflow in ad_pcm.c

2005-09-0100:00:00
Gentoo Foundation
security.gentoo.org
9

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.057 Low

EPSS

Percentile

93.4%

Background

MPlayer is a media player capable of handling multiple multimedia file formats.

Description

Sven Tantau discovered a heap overflow in the code handling the strf chunk of PCM audio streams.

Impact

An attacker could craft a malicious video or audio file which, when opened using MPlayer, would end up executing arbitrary code on the victim’s computer with the permissions of the user running MPlayer.

Workaround

You can mitigate the issue by adding “ac=-pcm,” to your MPlayer configuration file (note that this will prevent you from playing uncompressed audio).

Resolution

All MPlayer users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre7-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-video/mplayer< 1.0_pre7-r1UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.057 Low

EPSS

Percentile

93.4%