Buffer overflow in the HTTP parser for MPlayer 1.0pre3 and earlier, 0.90, and 0.91 allows remote attackers to execute arbitrary code via a long Location header.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=108067020624076&w=2 | |
http://secunia.com/advisories/11259 | Patch Vendor Advisory |
http://security.gentoo.org/glsa/glsa-200403-13.xml | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/723910 | Patch Third Party Advisory US Government Resource |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:026 | |
http://www.mplayerhq.hu/homepage/design6/news.html | |
http://www.securityfocus.com/archive/1/359025 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/10008 | Exploit Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15675 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2004-05-04 04:00
Updated : 2017-07-11 01:30
NVD link : CVE-2004-0386
Mitre link : CVE-2004-0386
CVE.ORG link : CVE-2004-0386
JSON object : View
Products Affected
mplayer
- mplayer
gentoo
- linux
mandrakesoft
- mandrake_linux
CWE