diff options
author | vd <vd@FreeBSD.org> | 2006-03-09 16:42:28 +0800 |
---|---|---|
committer | vd <vd@FreeBSD.org> | 2006-03-09 16:42:28 +0800 |
commit | def365c11aa012e939270b4554670b98a57e2d6a (patch) | |
tree | 6574894d0e924555f8d2879cdc7fd8027269ec25 /security | |
parent | 2fa08615a25eda320401d3d5e7f5e93cb3ff90ae (diff) | |
download | freebsd-ports-gnome-def365c11aa012e939270b4554670b98a57e2d6a.tar.gz freebsd-ports-gnome-def365c11aa012e939270b4554670b98a57e2d6a.tar.zst freebsd-ports-gnome-def365c11aa012e939270b4554670b98a57e2d6a.zip |
Fix mplayer vulnerability (heap overflow) in the ASF demuxer
Arbitrary remote code execution under the user ID running the player
when streaming an ASF file from a malicious server.
PR: ports/93767
Submitted by: "Thomas E. Zander" <riggs@rrr.de> (maintainer)
Approved by: portmgr (erwin)
Obtained from: mplayer CVS repo: http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/main/libmpdemux/demuxer.h.diff?r2=1.90&r1=1.87&f=u
Security: heap overflow in the ASF demuxer (http://www.mplayerhq.hu/design7/news.html#vuln13, http://bugs.gentoo.org/show_bug.cgi?id=122029)
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions