oss-sec mailing list archives

CVE Request: mplayer RDT parsing integer underlow


From: Tim Sammut <underling () gentoo org>
Date: Tue, 18 Oct 2011 20:27:22 -0700

Hi,

Please assign a CVE for this issue from 2009. From [1]:

"Function real_get_rdt_chunk() calls rtsp_read_data() to read RDT
(Real Data Transport) chunks headers from the network and after that it
will parse them. A controled variable is used to allocate a buffer and
later passed on to the rtsp_read_data() function in order to specify the
length of an RDT chunk data to read from the network. An integer
underflow can be triggered when parsing a malformed RDT header chunk,
a remote attacker can exploit it to execute arbitrary code in the
context of the application."

[1] http://seclists.org/fulldisclosure/2009/Jul/418
[2] https://secunia.com/advisories/36041/3/

thank you
tim

-- 
Tim Sammut ~ Gentoo Security Team
underling () gentoo org ~ C2375493

Attachment: signature.asc
Description: OpenPGP digital signature


Current thread: