Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 29640 - mplayer < 0.90pre1: Remotely exploitable buffer overflow
Summary: mplayer < 0.90pre1: Remotely exploitable buffer overflow
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High critical
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords: SECURITY
: 29555 29632 29725 29871 (view as bug list)
Depends on:
Blocks:
 
Reported: 2003-09-25 23:25 UTC by Rajiv Aaron Manglani (RETIRED)
Modified: 2003-09-29 13:05 UTC (History)
10 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Rajiv Aaron Manglani (RETIRED) gentoo-dev 2003-09-25 23:25:15 UTC
Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq@securityfocus.com>
List-Help: <mailto:bugtraq-help@securityfocus.com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
Date: Thu, 25 Sep 2003 12:38:26 +0200
From: Gabucino <gabucino-NO-SPAM@mplayerhq.hu>
To: bugtraq@securityfocus.com
Subject: MPlayer Security Advisory #01: Remotely exploitable buffer overflow
User-Agent: Mutt/1.3.27i
X-Operating-System: Linux woodstock 2.4.22-xfs
Sender: <gabucino@mplayerhq.hu>

Severity:
HIGH (if playing ASX streaming content)
LOW (if playing only normal files)

Description:
A remotely exploitable buffer overflow vulnerability was found in MPlayer.
A malicious host can craft a harmful ASX header, and trick MPlayer into
executing arbitrary code upon parsing that header.

MPlayer versions affected:
MPlayer 0.90pre series
MPlayer 0.90rc series
MPlayer 0.90
MPlayer 0.91
MPlayer 1.0pre1

MPlayer versions unaffected:
MPlayer releases before 0.90pre1
MPlayer 0.92
MPlayer HEAD CVS

Notification status:
Developers were notified on 2003.09.24
Fix was commited into HEAD CVS at 2003.09.25 02:36:36 CEST
MPlayer 0.92 (vuln-fix-only release) was released on 2003.09.25 12:00:00 CEST

Patch availability:
A patch is available for all vulnerable versions.

Suggested upgrading methods:
MPlayer 1.0pre1 users should upgrade to latest CVS
MPlayer 0.91 (and below) users should upgrade to 0.92 OR latest CVS

MPlayer 0.92 is available for download.

-- 
Gabucino
MPlayer Core Team
Comment 1 SpanKY gentoo-dev 2003-09-26 00:14:08 UTC
*** Bug 29632 has been marked as a duplicate of this bug. ***
Comment 2 Martin Holzer (RETIRED) gentoo-dev 2003-09-27 01:38:28 UTC
*** Bug 29725 has been marked as a duplicate of this bug. ***
Comment 3 Sundance 2003-09-27 08:39:46 UTC
FIX:

Install MPlayer 0.92.
This can be done in Portage by simply copying mplayer-0.91.ebuild to mplayer-0.92.ebuild
and re-emerging mplayer. MPlayer 0.92 is (supposedly) exactly the same as
0.91, just with the buffer overflow patched, and applying this simple fix
seems to work just fine.
Comment 4 solar (RETIRED) gentoo-dev 2003-09-27 12:00:19 UTC
How about the MPlayer 1.0pre1. Are we going to be able patch or shall we
package.mask ?
Comment 5 solar (RETIRED) gentoo-dev 2003-09-27 15:41:53 UTC
Found the mplayer patch and bumping versions.
tested 0.92 works just fine.

Not tested other than unpacking 1.00_pre1-r1 + secuirty fix
Comment 6 Martin Holzer (RETIRED) gentoo-dev 2003-09-27 15:50:30 UTC
just commited 0.92
Comment 7 solar (RETIRED) gentoo-dev 2003-09-27 16:08:21 UTC
Just commited fix for 1.0_pre1 as 1.0_pre1-r1
Comment 8 solar (RETIRED) gentoo-dev 2003-09-27 17:03:35 UTC
------------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-15
------------------------------------------------------------------------
          PACKAGE : media-video/mplayer
          SUMMARY : Buffer Overflow Vulnerability
             DATE : 2003-09-27 21:37 UTC
          EXPLOIT : remote
VERSIONS AFFECTED : <=mplayer-0.91 =mplayer-1.0_pre1
    FIXED VERSION : =mplayer-0.92 =mplayer-1.0_pre1-r1
    GENTOO BUG ID : 29640
              CVE : none that we are aware of at this time
------------------------------------------------------------------------

SUMMARY:
 A remotely exploitable buffer overflow vulnerability was found in
 MPlayer. A malicious host can craft a harmful ASX header, and trick
 MPlayer into executing arbitrary code upon parsing that header.

read the full advisory at:
 http://www.mplayerhq.hu/homepage/design6/news.html

SOLUTION:

 It is recommended that all Gentoo Linux users who are running
 media-video/mplayer upgrade to mplayer-0.92 as follows

 emerge sync
 emerge =media-video/mplayer-0.92
 emerge clean

 Additionally PaX users might want to /sbin/chpax -m /usr/bin/mplayer
Comment 9 Ronald Hummelink 2003-09-28 08:25:51 UTC
The 1.0_pre1-r1 ebuild seems to carry a wrong md5 in the digest file for
Blue-1.0.tar.bz2.
The md5 I get from the Blue-1.0.tar.bz2 file pulled from 3 mirrors matches
the md5 in the older ebuild digest, so I assume a mistake seeped into the
update.

Resync didn't fix this for me :)
Comment 10 solar (RETIRED) gentoo-dev 2003-09-28 10:58:29 UTC
md5sum from http://gentoo.oregonstate.edu/distfiles/Blue-1.0.tar.bz2 shows
ee26d46d5c52c5e3ac15164e78300b44

This seems to go back a while.
http://www.mail-archive.com/gentoo-user@gentoo.org/msg17690.html

Ronald please attach what md5sum you think this should be and why.


Comment 11 Ronald Hummelink 2003-09-28 12:58:33 UTC
Resolving gentoo.oregonstate.edu... done.
Connecting to gentoo.oregonstate.edu[128.193.0.3]:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 219,130 [application/x-tar]
 
100%[============================================================================================>]
219,130       13.77K/s    ETA 00:00
 
21:52:43 (13.77 KB/s) - `Blue-1.0.tar.bz2' saved [219130/219130]
 
ronald@natasha ronald $ md5sum Blue-1.0.tar.bz2
64e2d18438bbef16822c141d846884f6  Blue-1.0.tar.bz2

This md5 matches the file I pulled from ftp.mirror.ac.uk, ftp.easynet.nl
and ftp.student.utwente.nl.

# grep Blue digest-mplayer-0.92
MD5 64e2d18438bbef16822c141d846884f6 Blue-1.0.tar.bz2 219130
# grep Blue digest-mplayer-1.0_pre1-r1
MD5 ee26d46d5c52c5e3ac15164e78300b44 Blue-1.0.tar.bz2 219130

Also the just now deleted digest-mplayer-1.0_pre1 carried the 64e2d... md5sum
Comment 12 Ronald Hummelink 2003-09-28 13:10:27 UTC
Reading the topic on gentoo-user Solar pointed to I downloaded Blue from
http://www1.mplayerhq.hu/MPlayer/Skin/
This file also carries the 64e2d... md5sum and this md5sum is the same as
listed in the md5 file in the download dir.
Comment 13 Martin Holzer (RETIRED) gentoo-dev 2003-09-29 02:08:43 UTC
*** Bug 29871 has been marked as a duplicate of this bug. ***
Comment 14 Martin Holzer (RETIRED) gentoo-dev 2003-09-29 10:20:34 UTC
gentoo-devs please update your Blue-1.0.tar.bz2

digest update now in cvs
Comment 15 Martin Holzer (RETIRED) gentoo-dev 2003-09-29 12:48:36 UTC
*** Bug 29859 has been marked as a duplicate of this bug. ***
Comment 16 Martin Holzer (RETIRED) gentoo-dev 2003-09-29 12:48:54 UTC
*** Bug 29555 has been marked as a duplicate of this bug. ***
Comment 17 David Grant 2003-09-29 13:05:11 UTC
Can someone explain to me how Bug 29859 is a duplicate?