exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 39794

Secunia Security Advisory 39794
Posted May 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mplayer. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 124d801d9d499456decf6535d155a4aec53765b621011bafbaa2c8abaf571e30

Secunia Security Advisory 39794

Change Mirror Download
----------------------------------------------------------------------


Looking for a job?


Secunia is hiring skilled researchers and talented developers.


http://secunia.com/company/jobs/


----------------------------------------------------------------------

TITLE:
Debian update for mplayer

SECUNIA ADVISORY ID:
SA39794

VERIFY ADVISORY:
http://secunia.com/advisories/39794/

DESCRIPTION:
Debian has issued an update for mplayer. This fixes a vulnerability,
which can be exploited by malicious people to potentially compromise
a user's system.

For more information:
SA36041

SOLUTION:
Apply updated packages.

-- Debian GNU/Linux 5.0 alias lenny --

Stable updates are available for alpha, amd64, arm, armel, hppa,
i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2.dsc
Size/MD5 checksum: 2108 9ca97232aaa217afe30aef9800fdde5b
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2.diff.gz
Size/MD5 checksum: 360178 0cc960471e6ec0348456c014c774d941
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2.orig.tar.gz
Size/MD5 checksum: 11727998 f1da15bc4accee0a5551928e31d7b779

Architecture independent packages:

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc2-17+lenny3.2_all.deb
Size/MD5 checksum: 2462986 7cc9feae37dfc8b1be944894a9891689

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_alpha.deb
Size/MD5 checksum: 3236612 5481602134b6af1771014eb7421de776
http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_alpha.deb
Size/MD5 checksum: 2233470 f033d746bfcd34cd209881b0331ef76f

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_amd64.deb
Size/MD5 checksum: 3034790 7a9f3b0f603f127a59d9b0f1809b824f
http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_amd64.deb
Size/MD5 checksum: 2281646 44731cb89ba3b80811d38cebc1172a5c

arm architecture (ARM)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_arm.deb
Size/MD5 checksum: 2705438 76a8e88ec753cebda6fb72b6906b5a14
http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_arm.deb
Size/MD5 checksum: 1977840 e6911242b55c4b5e906f433509491f99

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_hppa.deb
Size/MD5 checksum: 2052866 ca07a7fa2a1d81132457b3a2ae2f8223
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_hppa.deb
Size/MD5 checksum: 2896686 a47fda1190c2460980aef76ea297f0bd

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_i386.deb
Size/MD5 checksum: 2370060 38e7272ca5582496be4a2f60f627f4b0
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_i386.deb
Size/MD5 checksum: 3032114 fa1a9d2c47430dadc81bd41ab6620cd2

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_ia64.deb
Size/MD5 checksum: 2056822 333d96f89bdf9d180c411501d952299e
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_ia64.deb
Size/MD5 checksum: 3580016 ea7ae7ac0e7837cec6b1bc4be405eef0

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_mips.deb
Size/MD5 checksum: 2847092 9b8f943f84c5c60eea7d20ad0ebf0826
http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_mips.deb
Size/MD5 checksum: 2120824 00788d698af99aad978503ea23bdd8b3

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_mipsel.deb
Size/MD5 checksum: 2064680 ff215968a214023be4dbb3875554c72b
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_mipsel.deb
Size/MD5 checksum: 2840214 003e55d7e3c6b127a41b16ab99f09c43

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_powerpc.deb
Size/MD5 checksum: 1991722 a94b911fecf6f37d14d5de2d1fe9a0ed
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_powerpc.deb
Size/MD5 checksum: 2867096 b6e68c0ff32e3974b0c84726ce57e215

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_s390.deb
Size/MD5 checksum: 2128050 b4075e1fb1350e32061cf5635b9b9556
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_s390.deb
Size/MD5 checksum: 2779844 b14c2c35e7287400b7c92f83b957061d

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-dbg_1.0~rc2-17+lenny3.2_sparc.deb
Size/MD5 checksum: 1898760 cbb824eafc9af867275f4abffbc89cd7
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc2-17+lenny3.2_sparc.deb
Size/MD5 checksum: 2688394 52c4508095e92e4e30b8a3d5da56b1fe

ORIGINAL ADVISORY:
DSA-2044-1:
http://lists.debian.org/debian-security-announce/2010/msg00085.html

OTHER REFERENCES:
SA36041:
http://secunia.com/advisories/36041/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close