DSA-1313-1 mplayer -- buffer overflow

Related Vulnerabilities: CVE-2007-2948  

Stefan Cornelius and Reimar Doeffinger discovered that the MPlayer movie player performs insufficient boundary checks when accessing CDDB data, which might lead to the execution of arbitrary code. The oldstable distribution (sarge) doesn't include MPlayer packages. For the stable distribution (etch) this problem has been fixed in version 1.0~rc1-12etch1. For the unstable distribution (sid) this problem has been fixed in version 1.0~rc1-14. We recommend that you upgrade your mplayer package.

Debian Security Advisory

DSA-1313-1 mplayer -- buffer overflow

Date Reported:
19 Jun 2007
Affected Packages:
mplayer
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2007-2948.
More information:

Stefan Cornelius and Reimar Doeffinger discovered that the MPlayer movie player performs insufficient boundary checks when accessing CDDB data, which might lead to the execution of arbitrary code.

The oldstable distribution (sarge) doesn't include MPlayer packages.

For the stable distribution (etch) this problem has been fixed in version 1.0~rc1-12etch4.

For the unstable distribution (sid) this problem has been fixed in version 1.0~rc1-14.

We recommend that you upgrade your mplayer package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4.dsc
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4.diff.gz
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc1-12etch4_all.deb
Alpha:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_ia64.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.