[MPlayer-DOCS] CVS: homepage/src news.src.en,1.190,1.191
Diego Biurrun CVS
syncmail at mplayerhq.hu
Sat Apr 9 21:00:32 CEST 2005
CVS change done by Diego Biurrun CVS
Update of /cvsroot/mplayer/homepage/src
In directory mail:/var2/tmp/cvs-serv13307/src
Modified Files:
news.src.en
Log Message:
Some old advisories for (almost) all security fixes from 1.0pre5try2.
Index: news.src.en
===================================================================
RCS file: /cvsroot/mplayer/homepage/src/news.src.en,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -r1.190 -r1.191
--- news.src.en 19 Mar 2005 13:16:57 -0000 1.190
+++ news.src.en 9 Apr 2005 19:00:30 -0000 1.191
@@ -8,6 +8,278 @@
<div class="newsentry">
<h2>
+ <a name="about_advisories">2005.04.09, Saturday :: a word about the last round of advisories</a>
+ <br><span class="poster">posted by Diego</span>
+</h2>
+
+<p>
+Before anyone gets wrong impressions...
+</p>
+
+<p>
+The last round of advisories from today is about vulnerabilities that were
+reported and fixed a long time ago, please look at the dates closely.
+</p>
+
+<p>
+So you can blame me for being lazy and not writing the advisories earlier,
+but not the MPlayer team for reacting slowly to vulnerability reports.
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="vuln08">2005.04.09, Saturday :: PNM streaming buffer overflow vulnerabilities</a>
+ <br><span class="poster">posted by Diego</span>
+</h2>
+
+<h3>Summary</h3>
+
+<p>
+<a href="http://www.idefense.com/">iDEFENSE</a> found two buffer overflow
+vulnerabilities in the PNM streaming code of <a href="http://xinehq.de">xine</a>
+that also affects MPlayer. You can read the details in the
+<a href="http://www.idefense.com/application/poi/display?id=177&type=vulnerabilities">iDEFENSE advisory</a>
+and the
+<a href="http://xinehq.de/index.php/security/XSA-2004-6">xine advisory</a>.
+</p>
+
+<h3>Severity</h3>
+
+<p>
+High (arbitrary remote code execution under the user ID running the player)
+when playing PNM streams.
+At the time the vulnerability was fixed there was no known exploit.
+</p>
+
+<h3>Solution</h3>
+
+<p>
+A fix for the vulnerability was checked into MPlayer CVS on
+Wed Dec 15 21:27:14 2004 UTC. Users of affected MPlayer
+versions should upgrade to an unaffected MPlayer version. Alternatively a
+<a href="../../MPlayer/patches/pnm_fix_20041215.diff">patch</a>
+is available that can be applied to the MPlayer source tree.
+</p>
+
+
+<h3>Affected versions</h3>
+
+<p>
+MPlayer 1.0pre5 and before
+</p>
+
+
+<h3>Unaffected versions</h3>
+
+<p>
+MPlayer 1.0pre5try2 and after
+</p>
+
+<h3>History</h3>
+
+<p>
+On Fri, 10 Dec 2004 xine developers were contacted by
+<a href="http://www.idefense.com">iDEFENSE</a> who had found two remote
+buffer overflow vulnerabilities in the xine PNM streaming code.
+Since this code is shared between MPlayer and xine, xine informed us of the
+problem and a fix was checked into MPlayer CVS on Wed Dec 15 21:27:14 2004 UTC.
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="vuln07">2005.04.09, Saturday :: RTSP streaming heap overflow vulnerability</a>
+ <br><span class="poster">posted by Diego</span>
+</h2>
+
+<h3>Summary</h3>
+
+<p>
+<a href="http://www.idefense.com/">iDEFENSE</a> found a heap overflow
+vulnerability in the RTSP streaming code. You can read the details in the
+<a href="http://www.idefense.com/application/poi/display?id=166&type=vulnerabilities">iDEFENSE advisory</a>.
+</p>
+
+<h3>Severity</h3>
+
+<p>
+Medium (arbitrary remote code execution under the user ID running the player)
+when playing RTSP streams.
+At the time the vulnerability was fixed there was no known exploit.
+</p>
+
+<h3>Solution</h3>
+
+<p>
+A fix for the vulnerability was checked into MPlayer CVS on
+Wed Dec 15 18:16:24 2004 UTC. Users of affected MPlayer
+versions should upgrade to an unaffected MPlayer version. Alternatively a
+<a href="../../MPlayer/patches/rtsp_fix_20041215.diff">patch</a>
+is available that can be applied to the MPlayer source tree.
+</p>
+
+
+<h3>Affected versions</h3>
+
+<p>
+MPlayer 1.0pre5 and before
+</p>
+
+
+<h3>Unaffected versions</h3>
+
+<p>
+MPlayer 1.0pre5try2 and after
+</p>
+
+<h3>History</h3>
+
+<p>
+On Fri, 10 Dec 2004 MPlayer developers were contacted by
+<a href="http://www.idefense.com">iDEFENSE</a> who had found a remote
+heap overflow vulnerability in the MPlayer RTSP streaming code.
+A fix was checked into MPlayer CVS on Wed Dec 15 18:16:24 2004 UTC.
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="vuln06">2005.04.09, Saturday :: MMST streaming stack overflow vulnerability</a>
+ <br><span class="poster">posted by Diego</span>
+</h2>
+
+<h3>Summary</h3>
+
+<p>
+<a href="http://www.idefense.com/">iDEFENSE</a> found a stack overflow
+vulnerability in the MMST streaming code. You can read the details in the
+<a href="http://www.idefense.com/application/poi/display?id=167&type=vulnerabilities">iDEFENSE advisory</a>.
+</p>
+
+<h3>Severity</h3>
+
+<p>
+High (arbitrary remote code execution under the user ID running the player)
+when playing MMST streams.
+At the time the vulnerability was fixed there was no known exploit.
+</p>
+
+<h3>Solution</h3>
+
+<p>
+A fix for the vulnerability was checked into MPlayer CVS on
+Wed, Dec 15 18:52:38 2004 UTC. Users of affected MPlayer
+versions should upgrade to an unaffected MPlayer version. Alternatively a
+<a href="../../MPlayer/patches/mmst_fix_20041215.diff">patch</a>
+is available that can be applied to the MPlayer source tree.
+</p>
+
+
+<h3>Affected versions</h3>
+
+<p>
+MPlayer 1.0pre5 and before
+</p>
+
+
+<h3>Unaffected versions</h3>
+
+<p>
+MPlayer 1.0pre5try2 and after
+</p>
+
+<h3>History</h3>
+
+<p>
+On Fri, 10 Dec 2004 MPlayer developers were contacted by
+<a href="http://www.idefense.com">iDEFENSE</a> who had found a remote
+stack overflow vulnerability in the MPlayer MMST streaming code.
+A fix was checked into MPlayer CVS on Wed, Dec 15 19:12:46 2004 UTC.
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
+ <a name="vuln05">2005.04.09, Saturday :: vulnerability in the bitmap parser</a>
+ <br><span class="poster">posted by Diego</span>
+</h2>
+
+<h3>Summary</h3>
+
+<p>
+<a href="http://www.idefense.com/">iDEFENSE</a> found a heap overflow
+vulnerability in the BMP demuxer. You can read the details in the
+<a href="http://www.idefense.com/application/poi/display?id=168&type=vulnerabilities">iDEFENSE advisory</a>.
+</p>
+
+<h3>Severity</h3>
+
+<p>
+Theoretical, the BMP demuxer is proof of concept code.
+We are not aware of multimedia content needing it.
+At the time the vulnerability was fixed there was no known exploit.
+</p>
+
+<h3>Solution</h3>
+
+<p>
+A fix for the vulnerability was checked into MPlayer CVS on
+Wed Dec 15 18:52:38 2004 UTC. Since the bitmap demuxer serves no known
+purpose it was removed immediately afterwards. Users of affected MPlayer
+versions should upgrade to an unaffected MPlayer version. Alternatively a
+<a href="../../MPlayer/patches/bmp_fix_20041215.diff">patch</a>
+is available that can be applied to the MPlayer source tree.
+</p>
+
+
+<h3>Affected versions</h3>
+
+<p>
+MPlayer 1.0pre5 and before
+</p>
+
+
+<h3>Unaffected versions</h3>
+
+<p>
+MPlayer 1.0pre5try2 and after
+</p>
+
+<h3>History</h3>
+
+<p>
+On Fri, 10 Dec 2004 MPlayer developers were contacted by
+<a href="http://www.idefense.com">iDEFENSE</a> who had found a remote
+heap overflow vulnerability in the MPlayer BMP parsing code.
+A fix was checked into MPlayer CVS on Wed, Dec 15 18:52:38 2004 UTC.
+Since the bitmap demuxer was written as proof of concept and is not needed
+for multimedia playback it was removed immediately afterwards.
+</p>
+
+</div>
+
+
+
+<div class="newsentry">
+
+<h2>
<a name="LqAward2004">2005.02.08, Tuesday :: LinuxQuestions.org Members Choice Award</a>
<br><span class="poster">posted by Diego</span>
</h2>
More information about the MPlayer-DOCS
mailing list