[原文]Multiple integer overflows in MPlayer 1.0pre7try2 allow remote attackers to cause a denial of service and trigger heap-based buffer overflows via (1) a certain ASF file handled by asfheader.c that causes the asf_descrambling function to be passed a negative integer after the conversion from a char to an int or (2) an AVI file with a crafted wLongsPerEntry or nEntriesInUse value in the indx chunk, which is handled in aviheader.c.
MPlayer libmpdemux/asfheader.c asf_descrambling() Function ASF Processing Overflow
Remote / Network Access
Loss of Integrity,
Loss of Availability
A remote overflow exists in MPlayer. MPlayer fails to properly handle a specially crafted ASF file in 'libmpdemux/asfheader.c' resulting in a integer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity and/or availability.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Discovery is credited to XFOCUS Security Team <firstname.lastname@example.org>.
MPlayer MPlayer 1.0.20060329
Mandriva Linux Mandrake 2006.0 x86_64
Mandriva Linux Mandrake 2006.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
Conectiva Linux 10.0
MPlayer is susceptible to two integer-overflow vulnerabilities. An attacker may exploit these issues to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may help the attacker gain unauthorized access or escalate privileges.
MPlayer version 1.0.20060329 is affected by these issues; other versions may also be affected.
Symantec is currently aware that exploits have been developed to leverage some or all of these issues. The exploits are not known to be publicly available at this time.
Please see the referenced advisories for details on obtaining and applying fixes.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: email@example.com:firstname.lastname@example.org