Buffer overflow in the HTTP parser for MPlayer 1.0pre3 and earlier, 0.90, and 0.91 allows remote attackers to execute arbitrary code via a long Location header.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=108067020624076&w=2 - | |
References | () http://secunia.com/advisories/11259 - Patch, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200403-13.xml - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/723910 - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2004:026 - | |
References | () http://www.mplayerhq.hu/homepage/design6/news.html - | |
References | () http://www.securityfocus.com/archive/1/359025 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/10008 - Exploit, Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/15675 - |
Information
Published : 2004-05-04 04:00
Updated : 2024-11-20 23:48
NVD link : CVE-2004-0386
Mitre link : CVE-2004-0386
CVE.ORG link : CVE-2004-0386
JSON object : View
Products Affected
mplayer
- mplayer
gentoo
- linux
mandrakesoft
- mandrake_linux
CWE