Buffer overflow in the HTTP parser for MPlayer 1.0pre3 and earlier, 0.90, and 0.91 allows remote attackers to execute arbitrary code via a long Location header.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/359025 | Patch Vendor Advisory |
http://www.mplayerhq.hu/homepage/design6/news.html | |
http://security.gentoo.org/glsa/glsa-200403-13.xml | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/723910 | Patch Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/10008 | Exploit Patch |
http://secunia.com/advisories/11259 | Patch Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:026 | |
http://marc.info/?l=bugtraq&m=108067020624076&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15675 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2004-05-03 21:00
Updated : 2017-07-10 18:30
NVD link : CVE-2004-0386
Mitre link : CVE-2004-0386
JSON object : View
CWE
Products Affected
mandrakesoft
- mandrake_linux
gentoo
- linux
mplayer
- mplayer