MPlayer Real demuxer heap overflow

2008.10.02
Risk: High
Local: Yes
Remote: No
CWE: CWE-189


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

2008/09/29 #2008-013 MPlayer Real demuxer heap overflow Description: The MPlayer multimedia player suffers from a vulnerability which could result in arbitrary code execution and at the least, in unexpected process termination. Three integer underflows located in the Real demuxer code can be used to exploit a heap overflow, a specific video file can be crafted in order to make the stream_read function reading or writing arbitrary amounts of memory. The following patch fixes the issue: http://www.ocert.org/patches/2008-013/mplayer_demux_real.patch Affected version: MPlayer <= 1.0_rc2 Fixed version: MPlayer, N/A Credit: vulnerability report, patch and PoC code received from Felipe Andres Manzano <fmanzano [at] fceia [dot] unr [dot] edu [dot] ar>. CVE: CVE-2008-3827 Timeline: 2008-08-12: vulnerability report received 2008-08-24: contacted mplayer maintainers 2008-08-25: maintainer provides patch 2008-08-28: reporter indicates that the patch is incomplete and sends new PoC 2008-09-15: maintainer provides updated patch 2008-09-16: reporter confirms patch 2008-09-29: advisory release References: Links: http://www.mplayerhq.hu Permalink: http://www.ocert.org/advisories/ocert-2008-013.html -- Andrea Barisani | Founder & Project Coordinator oCERT | Open Source Computer Emergency Response Team <lcars (at) ocert (dot) org [email concealed]> http://www.ocert.org 0x864C9B9E 0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E "Pluralitas non est ponenda sine necessitate"

References:

http://www.ocert.org/advisories/ocert-2008-013.html
http://www.securityfocus.com/archive/1/archive/1/496806/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top