aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorvd <vd@FreeBSD.org>2006-03-09 16:42:28 +0800
committervd <vd@FreeBSD.org>2006-03-09 16:42:28 +0800
commitdef365c11aa012e939270b4554670b98a57e2d6a (patch)
tree6574894d0e924555f8d2879cdc7fd8027269ec25 /security
parent2fa08615a25eda320401d3d5e7f5e93cb3ff90ae (diff)
downloadfreebsd-ports-gnome-def365c11aa012e939270b4554670b98a57e2d6a.tar.gz
freebsd-ports-gnome-def365c11aa012e939270b4554670b98a57e2d6a.tar.zst
freebsd-ports-gnome-def365c11aa012e939270b4554670b98a57e2d6a.zip
Fix mplayer vulnerability (heap overflow) in the ASF demuxer
Arbitrary remote code execution under the user ID running the player when streaming an ASF file from a malicious server. PR: ports/93767 Submitted by: "Thomas E. Zander" <riggs@rrr.de> (maintainer) Approved by: portmgr (erwin) Obtained from: mplayer CVS repo: http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/main/libmpdemux/demuxer.h.diff?r2=1.90&r1=1.87&f=u Security: heap overflow in the ASF demuxer (http://www.mplayerhq.hu/design7/news.html#vuln13, http://bugs.gentoo.org/show_bug.cgi?id=122029)
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions