diff options
author | Martin Wilke <miwi@FreeBSD.org> | 2007-03-09 15:48:35 +0000 |
---|---|---|
committer | Martin Wilke <miwi@FreeBSD.org> | 2007-03-09 15:48:35 +0000 |
commit | 31630be19eb7256bf4132a4b9c774a1f3d529e3e (patch) | |
tree | d7153a4b573f68b8c2cbaa1365905a0cc17f7741 /security | |
parent | 7b9ff6444e2aa440970819a9dbb74a3a63dfad8b (diff) |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 9d9a4e0d8a5c..7e10d9433a3a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,41 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="abeb9b64-ce50-11db-bc24-0016179b2dd5"> + <topic>mplayer -- DMO File Parsing Buffer Overflow Vulnerability</topic> + <affects> + <package> + <name>mplayer</name> + <name>mplayer-esound</name> + <name>mplayer-gtk</name> + <name>mplayer-gtk2</name> + <name>mplayer-gtk-esound</name> + <name>mplayer-gtk2-esound</name> + <range><lt>0.99.10_5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>"Moritz Jodeit reports::</p> + <blockquote cite="http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html"> + <p>There's an exploitable buffer overflow in the current version of + MPlayer (v1.0rc1) which can be exploited with a maliciously crafted + video file. It's hidden in the function DMO_VideoDecoder() in the + file loader/dmo/DMO_VideoDecoder.c. + </p> + </blockquote> + </body> + </description> + <references> + <bid>22771</bid> + <cvename>CVE-2007-1246</cvename> + </references> + <dates> + <discovery>2007-02-11</discovery> + <entry>2007-03-09</entry> + </dates> + </vuln> + <vuln vid="e546c7ce-ce46-11db-bc24-0016179b2dd5"> <topic>trac -- cross site scripting vulnerability</topic> <affects> |