CVE-2006-0579
CVSS7.5
发布时间 :2006-02-07 20:02:00
修订时间 :2011-03-07 21:30:21
NMCOP    

[原文]Multiple integer overflows in (1) the new_demux_packet function in demuxer.h and (2) the demux_asf_read_packet function in demux_asf.c in MPlayer 1.0pre7try2 and earlier allow remote attackers to execute arbitrary code via an ASF file with a large packet length value. NOTE: the provenance of this information is unknown; portions of the details are obtained from third party information.


[CNNVD]Mplayer 整数溢出漏洞(CNNVD-200602-088)

        MPlayer 1.0pre7try2及之前版本(1)demuxer.h中的new_demux_packet功能和(2)demux_asf.c中的demux_asf_read_packet功能存在多个整数溢出漏洞。远程攻击者可以借助具有较长数据包的ASF文件执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0579
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0579
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200602-088
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/0457
(UNKNOWN)  VUPEN  ADV-2006-0457
http://secunia.com/advisories/18718
(VENDOR_ADVISORY)  SECUNIA  18718
http://xforce.iss.net/xforce/xfdb/24531
(UNKNOWN)  XF  mplayer-asf-integer-overflow(24531)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:048
(UNKNOWN)  MANDRIVA  MDKSA-2006:048
http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml
(UNKNOWN)  GENTOO  GLSA-200603-03
http://secunia.com/advisories/19114
(UNKNOWN)  SECUNIA  19114

- 漏洞信息

Mplayer 整数溢出漏洞
高危 缓冲区溢出
2006-02-07 00:00:00 2006-02-08 00:00:00
远程  
        MPlayer 1.0pre7try2及之前版本(1)demuxer.h中的new_demux_packet功能和(2)demux_asf.c中的demux_asf_read_packet功能存在多个整数溢出漏洞。远程攻击者可以借助具有较长数据包的ASF文件执行任意代码。

- 公告与补丁

        

- 漏洞信息 (F44195)

Mandriva Linux Security Advisory 2006.048 (PacketStormID:F44195)
2006-02-26 00:00:00
Mandriva  mandriva.com
advisory,remote,overflow,arbitrary
linux,mandriva
CVE-2006-0579
[点击下载]

Mandriva Linux Security Advisory - Multiple integer overflows in the new_demux_packet function in demuxer.h and the demux_asf_read_packet function in demux_asf.c in MPlayer 1.0pre7try2 and earlier allow remote attackers to execute arbitrary code via an ASF file with a large packet length value.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2005:048
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : mplayer
 Date    : February 24, 2005
 Affected: 2006.0, Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 Multiple integer overflows in (1) the new_demux_packet function in
 demuxer.h and (2) the demux_asf_read_packet function in demux_asf.c in
 MPlayer 1.0pre7try2 and earlier allow remote attackers to execute
 arbitrary code via an ASF file with a large packet length value.
 
 The updated packages have been patched to prevent this problem.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0579
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 6a9787d26d2b82697525ea3ce1a42528  2006.0/RPMS/libdha1.0-1.0-1.pre7.12.2.20060mdk.i586.rpm
 2cee96ab48d748bd5c218c6b72762a69  2006.0/RPMS/libpostproc0-1.0-1.pre7.12.2.20060mdk.i586.rpm
 7d85bd28f30c98b00002c4da1fb27935  2006.0/RPMS/libpostproc0-devel-1.0-1.pre7.12.2.20060mdk.i586.rpm
 eeaae4efea7c733946468504c0847c6e  2006.0/RPMS/mencoder-1.0-1.pre7.12.2.20060mdk.i586.rpm
 a3e1114604c50095b4a00e3e2546fad4  2006.0/RPMS/mplayer-1.0-1.pre7.12.2.20060mdk.i586.rpm
 7c1d40d98a7c63b84836f17742424572  2006.0/RPMS/mplayer-gui-1.0-1.pre7.12.2.20060mdk.i586.rpm
 0ae9253d37d09e4e015c0dbea3e3238b  2006.0/SRPMS/mplayer-1.0-1.pre7.12.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 083cd368b22c862c3ad4e3c6809373ba  x86_64/2006.0/RPMS/lib64postproc0-1.0-1.pre7.12.2.20060mdk.x86_64.rpm
 f6764f327bc34aea319211a1ba848d46  x86_64/2006.0/RPMS/lib64postproc0-devel-1.0-1.pre7.12.2.20060mdk.x86_64.rpm
 7cd2b81fe303956e07ead2be2ce40d01  x86_64/2006.0/RPMS/mencoder-1.0-1.pre7.12.2.20060mdk.x86_64.rpm
 9962424187f6d7f99f91d65b22e62eea  x86_64/2006.0/RPMS/mplayer-1.0-1.pre7.12.2.20060mdk.x86_64.rpm
 fc4d22d72852405516379f36249626ae  x86_64/2006.0/RPMS/mplayer-gui-1.0-1.pre7.12.2.20060mdk.x86_64.rpm
 0ae9253d37d09e4e015c0dbea3e3238b  x86_64/2006.0/SRPMS/mplayer-1.0-1.pre7.12.2.20060mdk.src.rpm

 Corporate 3.0:
 79227923f532fd0d481b6a8999a48fb6  corporate/3.0/RPMS/libdha0.1-1.0-0.pre3.14.6.C30mdk.i586.rpm
 8239e565804440e9b5f33dab590825c4  corporate/3.0/RPMS/libpostproc0-1.0-0.pre3.14.6.C30mdk.i586.rpm
 b92ecaf616a975c840fd2d8d1640141b  corporate/3.0/RPMS/libpostproc0-devel-1.0-0.pre3.14.6.C30mdk.i586.rpm
 1a5c6dba5378d086e76ec1c05f5fe416  corporate/3.0/RPMS/mencoder-1.0-0.pre3.14.6.C30mdk.i586.rpm
 5d264152c0c2934f45c14576e3094a9d  corporate/3.0/RPMS/mplayer-1.0-0.pre3.14.6.C30mdk.i586.rpm
 74c1e627dd747a52181e49502fa404b6  corporate/3.0/RPMS/mplayer-gui-1.0-0.pre3.14.6.C30mdk.i586.rpm
 7ea541987b4b2285112e6c822704b797  corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.6.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 49ab3887057e1a407e85b09cea56d977  x86_64/corporate/3.0/RPMS/lib64postproc0-1.0-0.pre3.14.6.C30mdk.x86_64.rpm
 3e8fdbfc03ba3bdbba4a31c52b8a6770  x86_64/corporate/3.0/RPMS/lib64postproc0-devel-1.0-0.pre3.14.6.C30mdk.x86_64.rpm
 8d45d891ed90b1576acbc512f035f9bf  x86_64/corporate/3.0/RPMS/mencoder-1.0-0.pre3.14.6.C30mdk.x86_64.rpm
 2236312827cad9d6490340a9e7c66f6d  x86_64/corporate/3.0/RPMS/mplayer-1.0-0.pre3.14.6.C30mdk.x86_64.rpm
 803888f3129e969e1351ce6ce8a88d59  x86_64/corporate/3.0/RPMS/mplayer-gui-1.0-0.pre3.14.6.C30mdk.x86_64.rpm
 7ea541987b4b2285112e6c822704b797  x86_64/corporate/3.0/SRPMS/mplayer-1.0-0.pre3.14.6.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFD/3SJmqjQ0CJFipgRAppdAJwMKNiyvLVH+QXkX5IOMRvGzhA8iACfawcl
4MpPnK4igEjRxRY2ODPNZdg=
=LcLq
-----END PGP SIGNATURE-----

    

- 漏洞信息

22998
MPlayer ASF File Parsing Packet Length Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-02-07 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站