Debian Security Advisory
DSA-1496-1 mplayer -- buffer overflows
- Date Reported:
- 12 Feb 2008
- Affected Packages:
- mplayer
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2008-0485, CVE-2008-0486, CVE-2008-0629, CVE-2008-0630.
- More information:
-
Several buffer overflows have been discovered in the MPlayer movie player, which might lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2008-0485
Felipe Manzano and Anibal Sacco discovered a buffer overflow in the demuxer for MOV files.
- CVE-2008-0486
Reimar Doeffinger discovered a buffer overflow in the FLAC header parsing.
- CVE-2008-0629
Adam Bozanich discovered a buffer overflow in the CDDB access code.
- CVE-2008-0630
Adam Bozanich discovered a buffer overflow in URL parsing.
The old stable distribution (sarge) doesn't contain mplayer.
For the stable distribution (etch), these problems have been fixed in version 1.0~rc1-12etch2.
We recommend that you upgrade your mplayer packages.
- CVE-2008-0485
- Fixed in:
-
Debian GNU/Linux 4.0 (stable)
- Source:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1.orig.tar.gz
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2.dsc
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2.diff.gz
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2.dsc
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc1-12etch2_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_s390.deb
MD5 checksums of the listed files are available in the original advisory.