Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 103842 - Mplayer 1.0-pre7 and 1.0-pre6 buffer overflow vulnerability
Summary: Mplayer 1.0-pre7 and 1.0-pre6 buffer overflow vulnerability
Status: RESOLVED DUPLICATE of bug 103555
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.sven-tantau.de/public_file...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-08-26 10:32 UTC by Oleg Golberg
Modified: 2005-08-26 10:34 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Oleg Golberg 2005-08-26 10:32:38 UTC
Quoting the webpage of Sven Tantau who found the vulnerability:

"Affected Version: 1.0_pre7 (tested), 1.0_pre6-r4 (tested),
1.0pre6-3.3.5-20050130 (confirmed)
<...>
For high values of the 2 bytes strf parameter in the audio header of a
video file, it is possible to overflow sh_audio->a_buffer, overwrite the
instruction pointer and execute arbitrary code 
<...>
MPlayer developers patched the problem:
http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/main/libmpcodecs/ad_pcm.c.diff?r1=1.18&r2=1.19"

The patch applies cleanly to media-video/mplayer-1.0-pre7

Reproducible: Always
Steps to Reproduce:
Comment 1 Tavis Ormandy (RETIRED) gentoo-dev 2005-08-26 10:34:47 UTC

*** This bug has been marked as a duplicate of 103555 ***