int(3235)

Vulnerability Bulletins


Ejecución de código arbitrario en Mplayer

Vulnerability classification

Property Value
Confidence level Oficial
Impact Obtener acceso
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Mplayer < 1.0rc1try3

Description

Se ha encontrado una vulnerabilidad del tipo desbordamiento de pila en Mplayer en las versiones anteriores a la 1.0rc1try3. La vulnerabilidad reside en un error en el archivo stream/stream_cddb.c que no realiza suficientes comprobaciones de los límites cuando se accede a datos CDDB.

Un atacante remoto podría ejecutar código arbitrario mediante una entrada CDDB con un título largo de álbum o categoría.

Solution



Actualización de software

Debian

Debian Linux 4.0
Source
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1.dsc
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1.diff.gz
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc1-12etch1_all.deb
Alpha
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_amd64.deb
ARM
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_arm.deb
HP Precision
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_hppa.deb
Intel IA-32
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_ia64.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch1_sparc.deb

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libdha0.1-1.0-0.pre3.14.12.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libpostproc0-1.0-0.pre3.14.12.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/libpostproc0-devel-1.0-0.pre3.14.12.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/mencoder-1.0-0.pre3.14.12.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/mplayer-1.0-0.pre3.14.12.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/mplayer-gui-1.0-0.pre3.14.12.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.12.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64postproc0-1.0-0.pre3.14.12.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/lib64postproc0-devel-1.0-0.pre3.14.12.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/mencoder-1.0-0.pre3.14.12.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/mplayer-1.0-0.pre3.14.12.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/mplayer-gui-1.0-0.pre3.14.12.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.12.C30mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/libdha1.0-1.0-1.pre8.13.4mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/mencoder-1.0-1.pre8.13.4mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/mplayer-1.0-1.pre8.13.4mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/mplayer-gui-1.0-1.pre8.13.4mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/mplayer-1.0-1.pre8.13.4mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/mencoder-1.0-1.pre8.13.4mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/mplayer-1.0-1.pre8.13.4mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/mplayer-gui-1.0-1.pre8.13.4mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/mplayer-1.0-1.pre8.13.4mdv2007.0.src.rpm

Mandriva Linux 2007.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/libdha1.0-1.0-1.rc1.11.2mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/mencoder-1.0-1.rc1.11.2mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/mplayer-1.0-1.rc1.11.2mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/mplayer-doc-1.0-1.rc1.11.2mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/mplayer-gui-1.0-1.rc1.11.2mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/mplayer-1.0-1.rc1.11.2mdv2007.1.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/mencoder-1.0-1.rc1.11.2mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/mplayer-1.0-1.rc1.11.2mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/mplayer-doc-1.0-1.rc1.11.2mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/mplayer-gui-1.0-1.rc1.11.2mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/mplayer-1.0-1.rc1.11.2mdv2007.1.src.rpm

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux.

Standar resources

Property Value
CVE CVE-2007-2948
BID 24339

Other resources

Debian Security Advisory (DSA 1313-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00074.html

Mandriva Security Advisory (MDKSA-2007:143)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:143

SUSE Security Summary Report (SUSE-SR:2007:014)
http://www.novell.com/linux/security/advisories/2007_14_sr.html

Version history

Version Comments Date
1.0 Aviso emitido 2007-06-20
1.1 Aviso emitido por Mandriva (MDKSA-2007:143) 2007-07-10
1.2 Aviso emitido por Suse (SUSE-SR:2007:014) 2007-07-23
Ministerio de Defensa
CNI
CCN
CCN-CERT