[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE Request: mplayer RDT parsing integer
From:       Moritz Muehlenhoff <jmm () debian ! org>
Date:       2011-10-20 16:23:40
Message-ID: 20111020162340.GA5703 () inutil ! org
[Download RAW message or body]

On Thu, Oct 20, 2011 at 12:22:37PM -0400, Josh Bressers wrote:
> Please use CVE-2009-5027

This has already received a CVE ID, although for some reason it was     
never set public on the MITRE website:  
                                  
http://www.debian.org/security/2010/dsa-2043                    
http://www.debian.org/security/2010/dsa-2044                    

-> CVE-2010-2062

Cheers,             
         Moritz        









































> Thanks.
> 
> -- 
>     JB
> 
> ----- Original Message -----
> > Hi,
> > 
> > Please assign a CVE for this issue from 2009. From [1]:
> > 
> > "Function real_get_rdt_chunk() calls rtsp_read_data() to read RDT
> > (Real Data Transport) chunks headers from the network and after that
> > it
> > will parse them. A controled variable is used to allocate a buffer
> > and
> > later passed on to the rtsp_read_data() function in order to specify
> > the
> > length of an RDT chunk data to read from the network. An integer
> > underflow can be triggered when parsing a malformed RDT header chunk,
> > a remote attacker can exploit it to execute arbitrary code in the
> > context of the application."
> > 
> > [1] http://seclists.org/fulldisclosure/2009/Jul/418
> > [2] https://secunia.com/advisories/36041/3/
> > 
> > thank you
> > tim
> > 
> > --
> > Tim Sammut ~ Gentoo Security Team
> > underling@gentoo.org ~ C2375493
> > 
> > 
> 

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic