aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2008-03-07 07:02:05 +0800
committermiwi <miwi@FreeBSD.org>2008-03-07 07:02:05 +0800
commit0f473e845f97e3c99e4e71e9daed94a8b01417b5 (patch)
tree33353ae3da5a0e50ebbdb0f1b3fb3af2829a6abd /security/vuxml
parent116c58f9569f9dda157886c8aa4c13aa995d79ef (diff)
downloadfreebsd-ports-gnome-0f473e845f97e3c99e4e71e9daed94a8b01417b5.tar.gz
freebsd-ports-gnome-0f473e845f97e3c99e4e71e9daed94a8b01417b5.tar.zst
freebsd-ports-gnome-0f473e845f97e3c99e4e71e9daed94a8b01417b5.zip
- Document mplayer - multiple vulnerabilities
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml54
1 files changed, 54 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index c67fd703aaef..78ab057b8b45 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,60 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="de4d4110-ebce-11dc-ae14-0016179b2dd5">
+ <topic>mplayer -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mplayer</name>
+ <name>mplayer-esound</name>
+ <name>mplayer-gtk</name>
+ <name>mplayer-gtk2</name>
+ <name>mplayer-gtk-esound</name>
+ <name>mplayer-gtk2-esound</name>
+ <range><lt>0.99.11_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mplayer Team reports:</p>
+ <blockquote cite="http://www.mplayerhq.hu/design7/news.html">
+ <p>A buffer overflow was found in the code used to extract album
+ titles from CDDB server answers. When parsing answers from the
+ CDDB server, the album title is copied into a fixed-size buffer
+ with insufficient size checks, which may cause a buffer overflow.
+ A malicious database entry could trigger a buffer overflow in the
+ program. That can lead to arbitrary code execution with the UID of
+ the user running MPlayer.</p>
+ <p>A buffer overflow was found in the code used to escape URL
+ strings. The code used to skip over IPv6 addresses can be tricked
+ into leaving a pointer to a temporary buffer with a non-NULL value;
+ this causes the unescape code to reuse the buffer, and may lead to
+ a buffer overflow if the old buffer is smaller than required.
+ A malicious URL string may be used to trigger a buffer overflow in
+ the program, that can lead to arbitrary code execution with the UID
+ of the user running MPlayer.</p>
+ <p>A buffer overflow was found in the code used to parse MOV file
+ headers.The code read some values from the file and used them as
+ indexes into as array allocated on the heap without performing any
+ boundary check. A malicious file may be used to trigger a buffer
+ overflow in the program. That can lead to arbitrary code execution
+ with the UID of the user running MPlayer.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2008-0485</cvename>
+ <cvename>CVE-2008-0486</cvename>
+ <cvename>CVE-2008-0629</cvename>
+ <cvename>CVE-2008-0630</cvename>
+ <url>http://secunia.com/advisories/28779</url>
+ </references>
+ <dates>
+ <discovery>2008-02-05</discovery>
+ <entry>2008-03-06</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ca8e56d5-e856-11dc-b5af-0017319806e7">
<topic>ghostscript -- zseticcspace() function buffer overflow vulnerability</topic>
<affects>