Home page logo

oss-sec logo oss-sec mailing list archives

CVE Request: mplayer RDT parsing integer underlow
From: Tim Sammut <underling () gentoo org>
Date: Tue, 18 Oct 2011 20:27:22 -0700


Please assign a CVE for this issue from 2009. From [1]:

"Function real_get_rdt_chunk() calls rtsp_read_data() to read RDT
(Real Data Transport) chunks headers from the network and after that it
will parse them. A controled variable is used to allocate a buffer and
later passed on to the rtsp_read_data() function in order to specify the
length of an RDT chunk data to read from the network. An integer
underflow can be triggered when parsing a malformed RDT header chunk,
a remote attacker can exploit it to execute arbitrary code in the
context of the application."

[1] http://seclists.org/fulldisclosure/2009/Jul/418
[2] https://secunia.com/advisories/36041/3/

thank you

Tim Sammut ~ Gentoo Security Team
underling () gentoo org ~ C2375493

Attachment: signature.asc
Description: OpenPGP digital signature

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]