Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 89277 - media-video/mplayer has two new head overflows
Summary: media-video/mplayer has two new head overflows
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A2 [glsa] vorlon
Keywords:
Depends on:
Blocks:
 
Reported: 2005-04-16 00:57 UTC by Andre Hinrichs
Modified: 2005-04-20 00:29 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
Real RTSP heap overflow patch (rtsp_fix_20050415.diff,634 bytes, patch)
2005-04-16 00:59 UTC, Andre Hinrichs
no flags Details | Diff
MMST heap overflow patch (mmst_fix_20050415.diff,630 bytes, patch)
2005-04-16 01:00 UTC, Andre Hinrichs
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Andre Hinrichs 2005-04-16 00:57:46 UTC
As stated on the official mplayer homepage there are two head overflows.
Fixes are available for download on the homepage. I will attach the ported
patches.
Interestingly, they write about a pre7 version on the homepage, but it's not
officially been released yet.


Reproducible: Always
Steps to Reproduce:
Comment 1 Andre Hinrichs 2005-04-16 00:59:34 UTC
Created attachment 56428 [details, diff]
Real RTSP heap overflow patch
Comment 2 Andre Hinrichs 2005-04-16 01:00:32 UTC
Created attachment 56429 [details, diff]
MMST heap overflow patch
Comment 3 Jakub Moc (RETIRED) gentoo-dev 2005-04-16 02:42:28 UTC
2005.04.16, Saturday :: MMST heap overflow
posted by Roberto
Summary

A potential buffer overflow was found and fixed in code used to handle MMST streams.
Severity

High (arbitrary remote code execution under the user ID running the player) when streaming MMS/TCP data from a malicious server, null if you do not use this feature. At this time there is no known exploit.
Description

While enumerating streams from a server, MMST code stores stream IDs in a fixed length array, but there is no check to stop the process if too many stream IDs are received. A malicious server could announce more than 20 streams and overflow the array.
Solution

A fix for the vulnerability was checked into MPlayer CVS on Fri Apr 15 23:31:57 2005 UTC. Users of affected MPlayer versions should upgrade to an unaffected MPlayer version. Alternatively a patch is available that can be applied to the MPlayer source tree.
Affected versions

MPlayer 1.0pre6 and before (including pre6a)
Unaffected versions

MPlayer 1.0pre7 and after
CVS HEAD after Fri Apr 15 23:31:57 2005 UTC

=====================

 2005.04.16, Saturday :: Real RTSP heap overflow
posted by Roberto
Summary

A potential buffer overflow was found and fixed in code used to handle RealMedia RTSP streams.
Severity

High (arbitrary remote code execution under the user ID running the player) when streaming RTSP data from a malicious server, null if you do not use this feature. At this time there is no known exploit.
Description

While getting lines from a server, Real RTSP code stores them in a fixed size array of MAX_FIELDS elements, but there is no check to stop the process if too many lines are received. A malicious server could send more than MAX_FIELDS lines and overflow the array. Since the array holds pointers to answer strings, an attacker cannot write arbitrary data into it, making an exploit more difficult.
Solution

A fix for the vulnerability was checked into MPlayer CVS on Fri Apr 15 23:30:44 2005 UTC. Users of affected MPlayer versions should upgrade to an unaffected MPlayer version. Alternatively a patch is available that can be applied to the MPlayer source tree.
Affected versions

MPlayer 1.0pre6 and before (including pre6a)
Unaffected versions

MPlayer 1.0pre7 and after
CVS HEAD after Fri Apr 15 23:30:44 2005 UTC
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2005-04-16 04:27:00 UTC
media-video, please bump/patch/comment
Comment 5 Jan Brinkmann (RETIRED) gentoo-dev 2005-04-16 06:08:28 UTC
mplayer-1.0_pre5-r5 is the latest stable version for most architectures. we could apply the patches to mplayer-1.0_pre6* and then we should aim to mark mplayer-1.0_pre6-r1 stable. mplayer related problems which came in lately were related to -r2. when -pre7 will be released we could integrate it via the normal procedur into the tree (with the 30 day testing period etc) before going into stable.
Comment 6 Jan Brinkmann (RETIRED) gentoo-dev 2005-04-16 06:45:59 UTC
patches are now in the tree, mplayer-1.0_pre6-r{1,2,3} apply them. we should mark -r1 stable, afterwards _pre5 can be removed.
Comment 7 Jan Brinkmann (RETIRED) gentoo-dev 2005-04-16 07:50:30 UTC
ok, done. now we should mark mplayer-1.0_pre6-r4 stable. changed the following things:

mplayer-1.0_pre6-r1 -> mplayer-1.0_pre6-r4
mplayer-1.0_pre6-r2 -> mplayer-1.0_pre6-r5
mplayer-1.0_pre6-r3 -> mplayer-1.0_pre6-r6
Comment 8 Thierry Carrez (RETIRED) gentoo-dev 2005-04-16 09:59:45 UTC
Arches, please test mplayer-1.0_pre6-r4 and mark stable
Comment 9 Jan Brinkmann (RETIRED) gentoo-dev 2005-04-16 10:15:55 UTC
done for amd64 and x86
Comment 10 Michael Hanselmann (hansmi) (RETIRED) gentoo-dev 2005-04-16 12:42:54 UTC
Stable on ppc.
Comment 11 Jakub Moc (RETIRED) gentoo-dev 2005-04-17 01:48:59 UTC
*** Bug 89384 has been marked as a duplicate of this bug. ***
Comment 12 Markus Rothe (RETIRED) gentoo-dev 2005-04-17 03:26:52 UTC
stable on ppc64
Comment 13 Jason Wever (RETIRED) gentoo-dev 2005-04-17 14:27:37 UTC
Stable on SPARC.
Comment 14 Matthias Geerdsen (RETIRED) gentoo-dev 2005-04-18 02:20:05 UTC
GLSA drafted, security pls review

alpha, pls mark test and mark stable if possible
Comment 15 Bryan Østergaard (RETIRED) gentoo-dev 2005-04-18 17:21:40 UTC
Stable on alpha.
Comment 16 Matthias Geerdsen (RETIRED) gentoo-dev 2005-04-20 00:29:03 UTC
GLSA 200504-19

thanks everyone