From 9678adb638afa70e02e347a6e7f65d08f29fc8a2 Mon Sep 17 00:00:00 2001 From: miwi Date: Thu, 15 Jan 2009 23:00:51 +0000 Subject: - Document mplayer -- vulnerability in STR files processor PR: based on 130573 --- security/vuxml/vuln.xml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) (limited to 'security/vuxml') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 38245017ed8d..dc6668ca6f48 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file. --> + + mplayer -- vulnerability in STR files processor + + + mplayer + mplayer-esound + mplayer-gtk + mplayer-gtk-esound + mplayer-gtk2 + mplayer-gtk2-esound + 0.99.11_10 + + + + +

secunia reports:

+
+

The vulnerability is caused due to a boundary error within the + "str_read_packet()" function in libavformat/psxstr.c. This can be + exploited to cause a heap-based buffer overflow via a specially + crafted STR file.

+
+ +
+ + CVE-2008-3162 + 30157 + http://secunia.com/advisories/30994 + https://roundup.mplayerhq.hu/roundup/ffmpeg/issue311 + + + 2008-07-09 + 2009-01-15 + +
+ cgiwrap -- XSS Vulnerability -- cgit