Gentoo Logo

MPlayer: Multiple integer overflows


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200603-03 / MPlayer
Release Date March 04, 2006
Latest Revision June 21, 2006: 02
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
media-video/mplayer < 1.0.20060217 >= 1.0.20060217, >= 1.0_pre8 All supported architectures

Related bugreports: #115760, #122029


MPlayer is vulnerable to integer overflows in FFmpeg and ASF decoding that could potentially result in the execution of arbitrary code.

2.  Impact Information


MPlayer is a media player capable of handling multiple multimedia file formats.


MPlayer makes use of the FFmpeg library, which is vulnerable to a heap overflow in the avcodec_default_get_buffer() function discovered by Simon Kilvington (see GLSA 200601-06). Furthermore, AFI Security Research discovered two integer overflows in ASF file format decoding, in the new_demux_packet() function from libmpdemux/demuxer.h and the demux_asf_read_packet() function from libmpdemux/demux_asf.c.


An attacker could craft a malicious media file which, when opened using MPlayer, would lead to a heap-based buffer overflow. This could result in the execution of arbitrary code with the permissions of the user running MPlayer.

3.  Resolution Information


There is no known workaround at this time.


All MPlayer users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20060217"

4.  References


Page updated March 04, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.