oCERT Advisories

#2008-013 MPlayer Real demuxer heap overflow

Description:

The MPlayer multimedia player suffers from a vulnerability which could result in arbitrary code execution and at the least, in unexpected process termination.

Three integer underflows located in the Real demuxer code can be used to exploit a heap overflow, a specific video file can be crafted in order to make the stream_read function reading or writing arbitrary amounts of memory.

The following patch fixes the issues: mplayer_demux_real.patch.

Affected version:

MPlayer <= 1.0_rc2

Fixed version:

MPlayer >= 1.0_rc3

Credit: vulnerability report and PoC code received from Felipe Andres Manzano <fmanzano [at] fceia [dot] unr [dot] edu [dot] ar>. We would like to thank Reimar Döffinger from the MPlayer team for patching the issue.

CVE: CVE-2008-3827

Timeline:

2008-08-12: vulnerability report received
2008-08-24: contacted mplayer maintainers
2008-08-25: maintainer provides patch
2008-08-28: reporter indicates that the patch is incomplete and sends new PoC
2008-09-15: maintainer provides updated patch
2008-09-16: reporter confirms patch
2008-09-29: advisory release
2008-09-30: corrected credit section
2008-09-30: added reference to publicly commited patch and PoC

References:
http://svn.mplayerhq.hu/mplayer/trunk/libmpdemux/demux_real.c?r1=27314&r2=27675
http://felipe.andres.manzano.googlepages.com/OCERT-2008-013Mplayer.tgz

Permalink:
http://www.ocert.org/advisories/ocert-2008-013.html

© oCERT.org - Some rights reserved.