Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19700
HistoryApr 20, 2008 - 12:00 a.m.

[SECURITY] [DSA 1552-1] New mplayer packages fix arbitrary code execution

2008-04-2000:00:00
vulners.com
12

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Debian Security Advisory DSA-1552-1 [email protected]
http://www.debian.org/security/ Moritz Muehlenhoff
April 19, 2008 http://www.debian.org/security/faq


Package : mplayer
Vulnerability : missing input sanitising
Problem type : remote
Debian-specific: no
CVE Id(s) : CVE-2008-1558

It was discovered that the MPlayer movie player performs insufficient
input sanitising on SDP session data, leading to potential execution
of arbitrary code through a malformed multimedia stream.

For the stable distribution (etch), this problem has been fixed in
version 1.0~rc1-12etch3.

For the unstable distribution (sid), this problem has been fixed in
version 1.0~rc2-10.

We recommend that you upgrade your mplayer package.

Upgrade instructions


wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 4.0 (stable)


Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1.orig.tar.gz
Size/MD5 checksum: 10286260 815482129b79cb9390904b145c5def6c
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3.diff.gz
Size/MD5 checksum: 81742 54e2210e0f0eaa596acf6210b050fb50
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3.dsc
Size/MD5 checksum: 1265 6ccb62e72b94fa4c797975a36766bb45

Architecture independent packages:

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc1-12etch3_all.deb
Size/MD5 checksum: 2053074 2a88c44b4fa0e754660948ea7e42b8e4

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_alpha.deb
Size/MD5 checksum: 4707708 444e5067e94888747c62ea39b9ce1938

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_amd64.deb
Size/MD5 checksum: 4372894 8f8fb89d21cfc0d8eb028451208f6fb9

arm architecture (ARM)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_arm.deb
Size/MD5 checksum: 4325350 4ee43a3fa256b3e76aae898df3286ace

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_hppa.deb
Size/MD5 checksum: 4384442 4a9e2e68d4edcccd7f3bd4b08d1ac4c5

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_i386.deb
Size/MD5 checksum: 4421502 c0bfb3da63001b23532ff69750888a8e

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_ia64.deb
Size/MD5 checksum: 5842288 8d1fca3a56bbf0faafb39c6ebefd6c92

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_mips.deb
Size/MD5 checksum: 4274728 b51101e7fa8fb0ab197fd84ea9d36c59

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_mipsel.deb
Size/MD5 checksum: 4278972 bac174ec794adbcf9f9e4cc44951781e

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_powerpc.deb
Size/MD5 checksum: 4342252 2a30381673555b1626c407c5cfad56a3

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_s390.deb
Size/MD5 checksum: 4163070 81d36ad30bdefeaf77c4531fe4db5cb1

These files will probably be moved into the stable distribution on
its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>' and http://packages.debian.org/&lt;pkg&gt;
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFICiflXm3vHE4uyloRAoNbAKCI+f83HB9++1b0yhyScCiK500xZQCgtZoV
H7/seqOeU7knBqo6CYdjrPw=
=+a5l
-----END PGP SIGNATURE-----