mplayer
Page content
- Author: vmiklos
- Vulnerable: 1.0rc1-8
- Unaffected: 1.0rc1-9sayshell1
Some vulnerabilities have been reported in MPlayer, which can be exploited by malicious people to compromise a user’s system.
- A boundary error exists within the libmpdemux/demux_audio.c file when parsing FLAC comments. This can be exploited to corrupt memory via a specially crafted FLAC file.
- An array indexing error exists within the libmpdemux/demux_mov.c file when parsing MOV file headers. This can be exploited to corrupt heap memory via a specially crafted MOV file.
- A boundary error exists within the “url_scape_string()” function in stream/url.c. This can be exploited to cause a buffer overflow via a specially crafted URL.
- A boundary error exists within the “cddb_parse_matches_list()” and “cddb_query_parse()” functions in stream/stream_cddb.c. This can be exploited to cause a stack-based buffer overflow via an overly long album title received from a CDDB server. Successful exploitation allows execution of arbitrary code.
- Bug Tracker URL: http://bugs.frugalware.org/task/2774