aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorMartin Wilke <miwi@FreeBSD.org>2008-03-06 23:17:21 +0000
committerMartin Wilke <miwi@FreeBSD.org>2008-03-06 23:17:21 +0000
commitb1dc91d5e2a5c145f0f84080f7e71c06670db1f3 (patch)
treed44adc6993cb6a666fae6d851a76c4c55ece9fe8 /security/vuxml/vuln.xml
parentb45a3bfcd300449d16ea3ce7415faf279ccb3205 (diff)
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml4
1 files changed, 2 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 78ab057b8b45..3fda0c1ca827 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -49,7 +49,7 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>Mplayer Team reports:</p>
+ <p>The Mplayer team reports:</p>
<blockquote cite="http://www.mplayerhq.hu/design7/news.html">
<p>A buffer overflow was found in the code used to extract album
titles from CDDB server answers. When parsing answers from the
@@ -67,7 +67,7 @@ Note: Please add new entries to the beginning of this file.
the program, that can lead to arbitrary code execution with the UID
of the user running MPlayer.</p>
<p>A buffer overflow was found in the code used to parse MOV file
- headers.The code read some values from the file and used them as
+ headers. The code read some values from the file and used them as
indexes into as array allocated on the heap without performing any
boundary check. A malicious file may be used to trigger a buffer
overflow in the program. That can lead to arbitrary code execution