exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-014

Mandriva Linux Security Advisory 2009-014
Posted Jan 16, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-014 - Several vulnerabilities have been discovered in mplayer, which could allow remote attackers to execute arbitrary code via a malformed TwinVQ file. The updated packages have been patched to prevent this.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2008-4867, CVE-2008-5616
SHA-256 | 9cfd0c318b9b2db9c34a707efe8619667451d96695a913400ed896b46a89e709

Mandriva Linux Security Advisory 2009-014

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:014
http://www.mandriva.com/security/
_______________________________________________________________________

Package : mplayer
Date : January 15, 2009
Affected: 2008.0
_______________________________________________________________________

Problem Description:

Several vulnerabilities have been discovered in mplayer, which could
allow remote attackers to execute arbitrary code via a malformed
TwinVQ file (CVE-2008-5616), and in ffmpeg, as used by mplayer,
related to the execution of DTS generation code (CVE-2008-4866).

The updated packages have been patched to prevent this.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4867
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
d9309066e352a5846e6976601c86a454 2008.0/i586/libdha1.0-1.0-1.rc1.20.6mdv2008.0.i586.rpm
def4c10128e7d33721839f3f2247ad06 2008.0/i586/mencoder-1.0-1.rc1.20.6mdv2008.0.i586.rpm
54294bf5e706a95463e2e8f0c8f38076 2008.0/i586/mplayer-1.0-1.rc1.20.6mdv2008.0.i586.rpm
6d59c67a08541dc67dc0c4c85a0d4e4b 2008.0/i586/mplayer-doc-1.0-1.rc1.20.6mdv2008.0.i586.rpm
f128add5d06c1dfc3778759035039341 2008.0/i586/mplayer-gui-1.0-1.rc1.20.6mdv2008.0.i586.rpm
2b5ad581348b60487e389584a46c0404 2008.0/SRPMS/mplayer-1.0-1.rc1.20.6mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
5422f0b1080b6f8b2eb7b96a1881790b 2008.0/x86_64/mencoder-1.0-1.rc1.20.6mdv2008.0.x86_64.rpm
4e4e2b51037f0c3329925040ef5cbdbb 2008.0/x86_64/mplayer-1.0-1.rc1.20.6mdv2008.0.x86_64.rpm
ea7eb1f7ef63f0c043b9bbdf587fe394 2008.0/x86_64/mplayer-doc-1.0-1.rc1.20.6mdv2008.0.x86_64.rpm
60b6e1e65f89fba2d1bdc0913a53a727 2008.0/x86_64/mplayer-gui-1.0-1.rc1.20.6mdv2008.0.x86_64.rpm
2b5ad581348b60487e389584a46c0404 2008.0/SRPMS/mplayer-1.0-1.rc1.20.6mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJb97imqjQ0CJFipgRAoVCAJ4wZa/l1Ai6i887qxmprmsx6bdqfgCg7YSO
MEcSCvuwasY1p2g6Tkix5uQ=
=mgwF
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close