diff options
author | Ion-Mihai Tetcu <itetcu@FreeBSD.org> | 2007-01-08 16:06:29 +0000 |
---|---|---|
committer | Ion-Mihai Tetcu <itetcu@FreeBSD.org> | 2007-01-08 16:06:29 +0000 |
commit | 006d580437f2ea3c3d8ebca21032a90bf74ad9aa (patch) | |
tree | bb8b35f920559e4dcdff1646d85b748f0bb396aa /security | |
parent | 015180ee46361d232a7c1ca84364bd993f1e5638 (diff) | |
download | ports-006d580437f2ea3c3d8ebca21032a90bf74ad9aa.tar.gz ports-006d580437f2ea3c3d8ebca21032a90bf74ad9aa.zip |
Add mplayer RealMedia RTSP streams buffer overflow entry.
PR: ports/107217
Submitted by: Thomas E. Zander (multimedia/mplayer maintainer)
Reviewed by: simon@
Notes
Notes:
svn path=/head/; revision=181791
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e786664a36d0..10ed9b75be4b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,46 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b2ff68b2-9f29-11db-a4e4-0211d87675b7"> + <topic>mplayer -- buffer overflow in the code for RealMedia RTSP streams.</topic> + <affects> + <package> + <name>mplayer</name> + <name>mplayer-esound</name> + <name>mplayer-gtk</name> + <name>mplayer-gtk2</name> + <name>mplayer-gtk-esound</name> + <name>mplayer-gtk2-esound</name> + <range><lt>0.99.10_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <blockquote cite="http://www.mplayerhq.hu/design7/news.html"> + <p>A potential buffer overflow was found in the code used to handle + RealMedia RTSP streams. When checking for matching asm rules, the code + stores the results in a fixed-size array, but no boundary checks are + performed. This may lead to a buffer overflow if the user is tricked + into connecting to a malicious server. Since the attacker can not write + arbitrary data into the buffer, creating an exploit is very hard; but a + DoS attack is easily made. + A fix for this problem was committed to SVN on Sun Dec 31 13:27:53 2006 + UTC as r21799. The fix involves three files: stream/realrtsp/asmrp.c, + stream/realrtsp/asmrp.h and stream/realrtsp/real.c.</p> + </blockquote> + </body> + </description> + <references> + <freebsdpr>ports/107217</freebsdpr> + <cvename>CVE-2006-6172</cvename> + <url>http://www.mplayerhq.hu/design7/news.html</url> + </references> + <dates> + <discovery>2006-12-31</discovery> + <entry>2007-01-08</entry> + </dates> + </vuln> + <vuln vid="37e30313-9d8c-11db-858b-0060084a00e5"> <topic>fetchmail -- crashes when refusing a message bound for an MDA</topic> <affects> |