Bug 57296 - Update port: multimedia/mplayer 0.90.x -> 0.92, fix the exploitable remote buffer overflow vulnerability
Summary: Update port: multimedia/mplayer 0.90.x -> 0.92, fix the exploitable remote bu...
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: freebsd-ports-bugs (Nobody)
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2003-09-27 23:00 UTC by Jeremy Messenger
Modified: 2003-09-28 18:59 UTC (History)
1 user (show)

See Also:


Attachments
mplayer.diff (6.18 KB, patch)
2003-09-27 23:00 UTC, Jeremy Messenger
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Jeremy Messenger 2003-09-27 23:00:36 UTC
Severity:
	HIGH (if playing ASX streaming content)
	LOW (if playing only normal files)

Description:
	A remotely exploitable buffer overflow vulnerability was found in
	MPlayer. A malicious host can craft a harmful ASX header, and trick
	MPlayer into executing arbitrary code upon parsing that header.

MPlayer versions affected:
	MPlayer 0.90pre series
	MPlayer 0.90rc series
	MPlayer 0.90
	MPlayer 0.91
	MPlayer 1.0pre1

MPlayer versions unaffected:
	MPlayer releases before 0.90pre1
	MPlayer 0.92
	MPlayer HEAD CVS

Url: http://www.mplayerhq.hu/homepage/design6/news.html

Fix: -Upgrade to 0.92 to plug the exploitable.
-Add RUN_DEPENDS of mplayer-skins in the WITH_GUI define. Remove the message of
 tell user to go MPlayer website and download the skins. I think, it's silly
 and should be add RUN_DEPENDS since we have multimedia/mplayer-skins.

On another note: Please do the double check on the
mplayer-0.9.1-v6-20030825.diff.gz in case. I didn't find anything wrong with
it thought to apply it with 0.92 and play mplayer.
How-To-Repeat: n/a
Comment 1 Joe Marcus Clarke freebsd_committer freebsd_triage 2003-09-28 18:59:16 UTC
State Changed
From-To: open->closed

Superceded by ports/57324.