Mandriva Linux Security Advisory - Uncontrolled array index in the sdpplin_parse function in stream/realrtsp/sdpplin.c in MPlayer 1.0 rc2 allows remote attackers to overwrite memory and execute arbitrary code via a large streamid SDP parameter. The updated packages have been patched to fix this issue.
288b39aeb0256411875670bf5f2a1055a07b8cfcc4444c1fe4f369c2e347e08d
Gentoo Linux Security Advisory GLSA 200805-22 - k'sOSe reported an integer overflow vulnerability in the sdpplin_parse() function in the file stream/realrtsp/sdpplin.c, which can be exploited to overwrite arbitrary memory regions via an overly large StreamCount SDP parameter. Versions less than 1.0_rc2_p26753 are affected.
7a6af3650e7b8a3de24803736de098f1dbea4fdc36917b47eeb035c4ee6e6e1a
Debian Security Advisory 1552-1 - It was discovered that the MPlayer movie player performs insufficient input sanitising on SDP session data, leading to potential execution of arbitrary code through a malformed multimedia stream.
8f580fd68f6db72ed316696a7c779cf425c03dcd6f12fa9f4cd9cd9f62eb917d