diff options
author | Martin Wilke <miwi@FreeBSD.org> | 2008-03-06 23:17:21 +0000 |
---|---|---|
committer | Martin Wilke <miwi@FreeBSD.org> | 2008-03-06 23:17:21 +0000 |
commit | b1dc91d5e2a5c145f0f84080f7e71c06670db1f3 (patch) | |
tree | d44adc6993cb6a666fae6d851a76c4c55ece9fe8 /security/vuxml/vuln.xml | |
parent | b45a3bfcd300449d16ea3ce7415faf279ccb3205 (diff) |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 78ab057b8b45..3fda0c1ca827 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -49,7 +49,7 @@ Note: Please add new entries to the beginning of this file. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Mplayer Team reports:</p> + <p>The Mplayer team reports:</p> <blockquote cite="http://www.mplayerhq.hu/design7/news.html"> <p>A buffer overflow was found in the code used to extract album titles from CDDB server answers. When parsing answers from the @@ -67,7 +67,7 @@ Note: Please add new entries to the beginning of this file. the program, that can lead to arbitrary code execution with the UID of the user running MPlayer.</p> <p>A buffer overflow was found in the code used to parse MOV file - headers.The code read some values from the file and used them as + headers. The code read some values from the file and used them as indexes into as array allocated on the heap without performing any boundary check. A malicious file may be used to trigger a buffer overflow in the program. That can lead to arbitrary code execution |