CERTA-2004-AVI-152

Vulnerability from certfr_avis - Published: - Updated:

Plusieurs vulnérabilités ont été découvertes dans MPlayer et Xine permettant à un utilisateur mal intentionné d'exécuter du code arbitraire à distance.

Description

MPlayer et Xine sont des lecteurs multimedia open-source. RTSP (Real-Time Streaming Protocol) est un protocole de gestion de flux multimedia utilisé notamment pour communiquer avec les serveurs RealNetworks.
MPlayer et Xine partagent le même code source quant à la gestion du protocole RTSP.
Plusieurs vulnérabilités ont été découvertes dans le code gérant le procotole RTSP permettant à un utilisateur mal intentionné d'exécuter du code arbitraire à distance.

Solution

  • Mettre à jour MPlayer en version 1.0pre4. Site Internet de téléchargement de MPlayer :

    http://www.mplayerhq.hu/homepage/dload.html
    
  • Mettre à jour xine-lib en version 1-rc4. Site Internet de téléchargement de xine-lib :

    http://xinehq.de/index.php/releases
    
None
Impacted products
Vendor Product Description
N/A N/A xine-lib versions 1-beta1 à 1-rc3c.
N/A N/A MPlayer 1.0pre1-pre3try2 ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "xine-lib versions 1-beta1 \u00e0 1-rc3c.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "MPlayer 1.0pre1-pre3try2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nMPlayer et Xine sont des lecteurs multimedia open-source. RTSP\n(Real-Time Streaming Protocol) est un protocole de gestion de flux\nmultimedia utilis\u00e9 notamment pour communiquer avec les serveurs\nRealNetworks.  \nMPlayer et Xine partagent le m\u00eame code source quant \u00e0 la gestion du\nprotocole RTSP.  \nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le code g\u00e9rant le\nprocotole RTSP permettant \u00e0 un utilisateur mal intentionn\u00e9 d\u0027ex\u00e9cuter du\ncode arbitraire \u00e0 distance.\n\n## Solution\n\n-   Mettre \u00e0 jour MPlayer en version 1.0pre4. Site Internet de\n    t\u00e9l\u00e9chargement de MPlayer :\n\n        http://www.mplayerhq.hu/homepage/dload.html\n\n-   Mettre \u00e0 jour xine-lib en version 1-rc4. Site Internet de\n    t\u00e9l\u00e9chargement de xine-lib :\n\n        http://xinehq.de/index.php/releases\n",
  "cves": [],
  "links": [
    {
      "title": "Avis de s\u00e9curit\u00e9 MPlayer du 28 avril 2004 :",
      "url": "http://www.mplayerhq.hu/homepage/design7/news.html"
    },
    {
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 des paquetages NetBSD mplayer et    xine-lib :",
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/multimedia/mplayer/README.html"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 pour le paquetage OpenBSD mplayer du 06    mai 2004 :",
      "url": "http://www.vuxml.org/openbsd/"
    },
    {
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 des paquetages NetBSD mplayer et    xine-lib :",
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/multimedia/xine-lib/README.html"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 Gentoo GLSA 200405-24 du 01 juin 2004 :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200405-24.xml"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 SUSE SuSE-SA:2004:012 du 14 mai 2004 :",
      "url": "http://www.suse.com/de/security/2004_12_mc.html"
    }
  ],
  "reference": "CERTA-2004-AVI-152",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-05-03T00:00:00.000000"
    },
    {
      "description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 OpenBSD et NetBSD.",
      "revision_date": "2004-05-12T00:00:00.000000"
    },
    {
      "description": "correction des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 NetBSD, ajout du bulletin de s\u00e9curit\u00e9 de SUSE.",
      "revision_date": "2004-05-17T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo et de la r\u00e9f\u00e9rence CVE.",
      "revision_date": "2004-06-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans MPlayer et Xine\npermettant \u00e0 un utilisateur mal intentionn\u00e9 d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de MPlayer et Xine",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 Xine XSA-2004-3",
      "url": "http://xinehq.de/index.php/security/XSA-2004-3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…