CVE-2006-6172

Buffer overflow in the asmrp_eval function in the RealMedia RTSP stream handler (asmrp.c) for Real Media input plugin, as used in (1) xine/xine-lib, (2) MPlayer 1.0rc1 and earlier, and possibly others, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a rulebook with a large number of rulematches.
References
Link Resource
http://secunia.com/advisories/23218
http://secunia.com/advisories/23242
http://secunia.com/advisories/23249
http://secunia.com/advisories/23301
http://secunia.com/advisories/23335
http://secunia.com/advisories/23512
http://secunia.com/advisories/23567
http://secunia.com/advisories/24336
http://secunia.com/advisories/24339
http://secunia.com/advisories/25555
http://security.gentoo.org/glsa/glsa-200612-02.xml
http://security.gentoo.org/glsa/glsa-200702-11.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
http://sourceforge.net/project/shownotes.php?release_id=468432
http://www.debian.org/security/2006/dsa-1244
http://www.mandriva.com/security/advisories?name=MDKSA-2006:224
http://www.mandriva.com/security/advisories?name=MDKSA-2007:112
http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff
http://www.mplayerhq.hu/design7/news.html#vuln14
http://www.novell.com/linux/security/advisories/2006_28_sr.html
http://www.securityfocus.com/bid/21435
http://www.ubuntu.com/usn/usn-392-1
http://www.vupen.com/english/advisories/2006/4824
https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655 Exploit Patch Vendor Advisory
http://secunia.com/advisories/23218
http://secunia.com/advisories/23242
http://secunia.com/advisories/23249
http://secunia.com/advisories/23301
http://secunia.com/advisories/23335
http://secunia.com/advisories/23512
http://secunia.com/advisories/23567
http://secunia.com/advisories/24336
http://secunia.com/advisories/24339
http://secunia.com/advisories/25555
http://security.gentoo.org/glsa/glsa-200612-02.xml
http://security.gentoo.org/glsa/glsa-200702-11.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842
http://sourceforge.net/project/shownotes.php?release_id=468432
http://www.debian.org/security/2006/dsa-1244
http://www.mandriva.com/security/advisories?name=MDKSA-2006:224
http://www.mandriva.com/security/advisories?name=MDKSA-2007:112
http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff
http://www.mplayerhq.hu/design7/news.html#vuln14
http://www.novell.com/linux/security/advisories/2006_28_sr.html
http://www.securityfocus.com/bid/21435
http://www.ubuntu.com/usn/usn-392-1
http://www.vupen.com/english/advisories/2006/4824
https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655 Exploit Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mplayer:mplayer:*:*:*:*:*:*:*:*
cpe:2.3:a:xine:real_media_input_plugin:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://secunia.com/advisories/23218 - () http://secunia.com/advisories/23218 -
References () http://secunia.com/advisories/23242 - () http://secunia.com/advisories/23242 -
References () http://secunia.com/advisories/23249 - () http://secunia.com/advisories/23249 -
References () http://secunia.com/advisories/23301 - () http://secunia.com/advisories/23301 -
References () http://secunia.com/advisories/23335 - () http://secunia.com/advisories/23335 -
References () http://secunia.com/advisories/23512 - () http://secunia.com/advisories/23512 -
References () http://secunia.com/advisories/23567 - () http://secunia.com/advisories/23567 -
References () http://secunia.com/advisories/24336 - () http://secunia.com/advisories/24336 -
References () http://secunia.com/advisories/24339 - () http://secunia.com/advisories/24339 -
References () http://secunia.com/advisories/25555 - () http://secunia.com/advisories/25555 -
References () http://security.gentoo.org/glsa/glsa-200612-02.xml - () http://security.gentoo.org/glsa/glsa-200612-02.xml -
References () http://security.gentoo.org/glsa/glsa-200702-11.xml - () http://security.gentoo.org/glsa/glsa-200702-11.xml -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.433842 -
References () http://sourceforge.net/project/shownotes.php?release_id=468432 - () http://sourceforge.net/project/shownotes.php?release_id=468432 -
References () http://www.debian.org/security/2006/dsa-1244 - () http://www.debian.org/security/2006/dsa-1244 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:224 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:224 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:112 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:112 -
References () http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff - () http://www.mplayerhq.hu/MPlayer/patches/asmrules_fix_20061231.diff -
References () http://www.mplayerhq.hu/design7/news.html#vuln14 - () http://www.mplayerhq.hu/design7/news.html#vuln14 -
References () http://www.novell.com/linux/security/advisories/2006_28_sr.html - () http://www.novell.com/linux/security/advisories/2006_28_sr.html -
References () http://www.securityfocus.com/bid/21435 - () http://www.securityfocus.com/bid/21435 -
References () http://www.ubuntu.com/usn/usn-392-1 - () http://www.ubuntu.com/usn/usn-392-1 -
References () http://www.vupen.com/english/advisories/2006/4824 - () http://www.vupen.com/english/advisories/2006/4824 -
References () https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655 - Exploit, Patch, Vendor Advisory () https://sourceforge.net/tracker/index.php?func=detail&aid=1603458&group_id=9655&atid=109655 - Exploit, Patch, Vendor Advisory

Information

Published : 2006-11-30 15:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6172

Mitre link : CVE-2006-6172

CVE.ORG link : CVE-2006-6172


JSON object : View

Products Affected

mplayer

  • mplayer

xine

  • real_media_input_plugin