aboutsummaryrefslogtreecommitdiffstats
path: root/security/portaudit-db/database/portaudit.xml
blob: c0d547850c9751c659c71e6ee52d34dfa67d7dc3 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
<?xml version="1.0" encoding="utf-8"?>
<!--
This file is in the public domain.
  $FreeBSD$
-->
<!DOCTYPE vuxml PUBLIC "-//vuxml.org//DTD VuXML 1.1//EN" "http://www.vuxml.org/dtd/vuxml-1/vuxml-11.dtd">
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">

  <vuln vid="42e330ab-82a4-11d8-868e-000347dd607f">
    <topic>MPlayer remotely exploitable buffer overflow in the ASX parser</topic>
    <affects>
      <package>
        <name>mplayer</name>
        <name>mplayer-esound</name>
        <name>mplayer-gtk</name>
        <name>mplayer-gtk-esound</name>
        <range><lt>0.92</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">
        <p>A remotely exploitable buffer overflow vulnerability was found in
          MPlayer. A malicious host can craft a harmful ASX header,
          and trick MPlayer into executing arbitrary code upon parsing that header.</p>
      </body>
    </description>
    <references>
      <url>http://www.mplayerhq.hu/</url>
      <url>http://www.securityfocus.com/archive/1/339330</url>
      <url>http://www.securityfocus.com/archive/1/339193</url>
      <cvename>CAN-2003-0835</cvename>
      <bid>8702</bid>
    </references>
    <dates>
      <discovery>2003-09-24</discovery>
      <entry>2004-03-30</entry>
    </dates>
  </vuln>

  <vuln vid="d8c46d74-8288-11d8-868e-000347dd607f">
    <topic>MPlayer remotely exploitable buffer overflow in the HTTP parser</topic>
    <affects>
      <package>
        <name>mplayer</name>
        <name>mplayer-esound</name>
        <name>mplayer-gtk</name>
        <name>mplayer-gtk-esound</name>
        <range><lt>0.92.1</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">
        <p>A remotely exploitable buffer overflow vulnerability was found in
          MPlayer. A malicious host can craft a harmful HTTP header (&quot;Location:&quot;),
          and trick MPlayer into executing arbitrary code upon parsing that header.</p>
      </body>
    </description>
    <references>
      <url>http://www.mplayerhq.hu/</url>
      <url>http://www.securityfocus.com/archive/1/359029</url>
      <url>http://www.securityfocus.com/archive/1/359025</url>
    </references>
    <dates>
      <discovery>2004-03-29</discovery>
      <entry>2004-03-30</entry>
    </dates>
  </vuln>

  <vuln vid="1ed556e6-734f-11d8-868e-000347dd607f">
    <cancelled superseded="1a448eb7-6988-11d8-873f-0020ed76ef5a"/>
  </vuln>

</vuxml>