[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CESA-2010:0094 -- centos 4 i386 HelixPlayer

ID: oval:org.secpod.oval:def:200093Date: (C)2012-01-31   (M)2021-06-02
Class: PATCHFamily: unix




HelixPlayer is a media player. Multiple buffer and integer overflow flaws were found in the way HelixPlayer processed Graphics Interchange Format files. An attacker could create a specially-crafted GIF file which would cause HelixPlayer to crash or, potentially, execute arbitrary code when opened. A buffer overflow flaw was found in the way HelixPlayer processed Synchronized Multimedia Integration Language files. An attacker could create a specially-crafted SMIL file which would cause HelixPlayer to crash or, potentially, execute arbitrary code when opened. A buffer overflow flaw was found in the way HelixPlayer handled the Real Time Streaming Protocol SET_PARAMETER directive. A malicious RTSP server could use this flaw to crash HelixPlayer or, potentially, execute arbitrary code. Multiple buffer overflow flaws were discovered in the way HelixPlayer handled RuleBook structures in media files and RTSP streams. Specially-crafted input could cause HelixPlayer to crash or, potentially, execute arbitrary code. A buffer overflow flaw was found in the way HelixPlayer performed URL un-escaping. A specially-crafted URL string could cause HelixPlayer to crash or, potentially, execute arbitrary code. All HelixPlayer users are advised to upgrade to this updated package, which contains backported patches to resolve these issues. All running instances of HelixPlayer must be restarted for this update to take effect.

Platform:
CentOS 4
Product:
HelixPlayer
Reference:
CESA-2010:0094
CVE-2009-4242
CVE-2009-4245
CVE-2009-4247
CVE-2009-4248
CVE-2009-4257
CVE-2010-0416
CVE-2010-0417
CVE    7
CVE-2009-4248
CVE-2009-4247
CVE-2009-4257
CVE-2009-4245
...
CPE    1
cpe:/o:centos:centos:4

© SecPod Technologies