GLSA-200408-01 : MPlayer: GUI filename handling overflow

critical Nessus Plugin ID 14557

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200408-01 (MPlayer: GUI filename handling overflow)

The MPlayer GUI code contains several buffer overflow vulnerabilities, and at least one in the TranslateFilename() function is exploitable.
Impact :

By enticing a user to play a file with a carefully crafted filename an attacker could execute arbitrary code with the permissions of the user running MPlayer.
Workaround :

To work around this issue, users can compile MPlayer without GUI support by disabling the gtk USE flag. All users are encouraged to upgrade to the latest available version of MPlayer.

Solution

All MPlayer users should upgrade to the latest version:
# emerge sync # emerge -pv '>=media-video/mplayer-1.0_pre4-r7' # emerge '>=media-video/mplayer-1.0_pre4-r7'

See Also

http://ww17.open-security.org/advisories/5

https://security.gentoo.org/glsa/200408-01

Plugin Details

Severity: Critical

ID: 14557

File Name: gentoo_GLSA-200408-01.nasl

Version: 1.18

Type: local

Published: 8/30/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:mplayer, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/1/2004

Reference Information

CVE: CVE-2004-0659

BID: 10615

GLSA: 200408-01