Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2008.0153 -- [Debian] New mplayer packages fix arbitrary code execution 13 February 2008 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: mplayer Publisher: Debian Operating System: Debian GNU/Linux 4.0 Impact: Execute Arbitrary Code/Commands Access: Remote/Unauthenticated CVE Names: CVE-2008-0630 CVE-2008-0629 CVE-2008-0486 CVE-2008-0485 Ref: ESB-2008.0114 Original Bulletin: http://www.debian.org/security/2008/dsa-1496 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ Debian Security Advisory DSA-1496-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff February 12, 2008 http://www.debian.org/security/faq - - ------------------------------------------------------------------------ Package : mplayer Vulnerability : buffer overflows Problem type : local(remote) Debian-specific: no CVE Id(s) : CVE-2008-0485 CVE-2008-0486 CVE-2008-0629 CVE-2008-0630 Several buffer overflows have been discovered in the MPlayer movie player, which might lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0485 Felipe Manzano and Anibal Sacco discovered a buffer overflow in the demuxer for MOV files. CVE-2008-0486 Reimar Doeffinger discovered a buffer overflow in the FLAC header parsing. CVE-2008-0629 Adam Bozanich discovered a buffer overflow in the CDDB access code. CVE-2008-0630 Adam Bozanich discovered a buffer overflow in URL parsing. For the stable distribution (etch), these problems have been fixed in version 1.0~rc1-12etch2. The old stable distribution (sarge) doesn't contain mplayer. We recommend that you upgrade your mplayer packages. Upgrade instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian 4.0 (stable) - - ------------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1.orig.tar.gz Size/MD5 checksum: 10286260 815482129b79cb9390904b145c5def6c http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2.dsc Size/MD5 checksum: 1265 e247c07b25f52ae90c66d1147ed2dad3 http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2.diff.gz Size/MD5 checksum: 82320 4fbe0a18dad58eb0fde6388bfa0fd6fe Architecture independent packages: http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc1-12etch2_all.deb Size/MD5 checksum: 2042982 dcae457fc598d095481ae958b4b2be33 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_alpha.deb Size/MD5 checksum: 4705092 f8a36452c703da05dda73b88b10574d5 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_amd64.deb Size/MD5 checksum: 4371682 ea9e372fbc21656a37833f7a48caaa84 arm architecture (ARM) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_arm.deb Size/MD5 checksum: 4325240 841828bbc45a01d1ced4baffa54e4c82 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_hppa.deb Size/MD5 checksum: 4383526 a5a37e479515be1eacbb3eb801f558b0 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_i386.deb Size/MD5 checksum: 4556720 fc9d62d80284dcb7501d4aa46d90705f ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_ia64.deb Size/MD5 checksum: 5842148 8e554b82c704849813e3bcbdf979d276 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_mips.deb Size/MD5 checksum: 4274610 ba330371c3a4a476fc592e260fe9b928 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_mipsel.deb Size/MD5 checksum: 4278942 56998d94712efad908d30bc068ce2a57 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_powerpc.deb Size/MD5 checksum: 4342144 18e70bd86fdab75e181ff9a53976c7e4 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch2_s390.deb Size/MD5 checksum: 4163034 58e5f78fea7e16ee261c371c9a5c1ac6 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHsiS9Xm3vHE4uyloRAmyEAKDDtAFBxQ0G5NMM7L69Rl7itrX8kQCfQE5k K7bOq5DQhGqNYWuZRKFg4ME= =Kqxz - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBR7JOXCh9+71yA2DNAQLS/gP+P1kh5+Psm/ciOM1ZN+zxa66dj2O2eKMR wHZViy7XY8R7NVxBelcSod4MvWJ5zsxwhp/PULbX/N3hokUw1XBExspJPFR0yS28 hYV+QKM8BUoFf+ZdHqZkCH/mSBB19whp5U2/Lzr0bNoWJV94yiHYF54osfki4Jtt WrqkQJRm94w= =zwdh -----END PGP SIGNATURE-----