[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] CVE Request: mplayer RDT parsing integer
From: Moritz Muehlenhoff <jmm () debian ! org>
Date: 2011-10-20 16:23:40
Message-ID: 20111020162340.GA5703 () inutil ! org
[Download RAW message or body]
On Thu, Oct 20, 2011 at 12:22:37PM -0400, Josh Bressers wrote:
> Please use CVE-2009-5027
This has already received a CVE ID, although for some reason it was
never set public on the MITRE website:
http://www.debian.org/security/2010/dsa-2043
http://www.debian.org/security/2010/dsa-2044
-> CVE-2010-2062
Cheers,
Moritz
> Thanks.
>
> --
> JB
>
> ----- Original Message -----
> > Hi,
> >
> > Please assign a CVE for this issue from 2009. From [1]:
> >
> > "Function real_get_rdt_chunk() calls rtsp_read_data() to read RDT
> > (Real Data Transport) chunks headers from the network and after that
> > it
> > will parse them. A controled variable is used to allocate a buffer
> > and
> > later passed on to the rtsp_read_data() function in order to specify
> > the
> > length of an RDT chunk data to read from the network. An integer
> > underflow can be triggered when parsing a malformed RDT header chunk,
> > a remote attacker can exploit it to execute arbitrary code in the
> > context of the application."
> >
> > [1] http://seclists.org/fulldisclosure/2009/Jul/418
> > [2] https://secunia.com/advisories/36041/3/
> >
> > thank you
> > tim
> >
> > --
> > Tim Sammut ~ Gentoo Security Team
> > underling@gentoo.org ~ C2375493
> >
> >
>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic