Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 46864 - A remotely exploitable buffer overflow vulnerability was found in MPlayer.
Summary: A remotely exploitable buffer overflow vulnerability was found in MPlayer.
Status: RESOLVED DUPLICATE of bug 46246
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL: http://www.mplayerhq.hu/homepage/desi...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2004-04-05 08:20 UTC by Svein
Modified: 2011-10-30 22:40 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Svein 2004-04-05 08:20:11 UTC
Since nobody have reported it yet. Here it is:

A malicious host can craft a harmful HTTP header ("Location:"), and trick MPlayer into executing arbitrary code upon parsing that header.

MPlayer versions affected:
MPlayer 0.90pre series
MPlayer 0.90rc series
MPlayer 0.90
MPlayer 0.91
MPlayer 1.0pre1
MPlayer 1.0pre2
MPlayer 1.0pre3

Reproducible: Always
Steps to Reproduce:
1.
2.
3.




Patch from mplayerhq.hu:

diff -u -r1.17 -r1.18
--- http.c	13 Nov 2002 09:02:55 -0000	1.17
+++ http.c	30 Mar 2004 10:58:41 -0000	1.18
@@ -175,7 +175,7 @@
 	if( http_hdr->method==NULL ) http_set_method( http_hdr, "GET");
 	if( http_hdr->uri==NULL ) http_set_uri( http_hdr, "/");
 	else {
-		uri = (char*)malloc(strlen(http_hdr->uri)*2);
+		uri = (char*)malloc((strlen(http_hdr->uri)*3) + 1);
 		if( uri==NULL ) {
 			mp_msg(MSGT_NETWORK,MSGL_ERR,"Memory allocation failed\n");
 			return NULL;
Comment 1 Kurt Lieber (RETIRED) gentoo-dev 2004-04-05 08:22:35 UTC

*** This bug has been marked as a duplicate of 46246 ***