Page 7 of 33 results (0.004 seconds)

CVSS: 10.0EPSS: 8%CPEs: 16EXPL: 0

Multiple buffer overflows in the Real-Time Streaming Protocol (RTSP) client for (1) MPlayer before 1.0pre4 and (2) xine lib (xine-lib) before 1-rc4, when playing Real RTSP (realrtsp) streams, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (a) long URLs, (b) long Real server responses, or (c) long Real Data Transport (RDT) packets. Múltiples desbordamientos de búfer en cliente Real-Time Streaming Protocol (RTSP) de (1) MPlayer anteriores a 1.0pre4 y (2) xine lib (xine-lib) anteriores a 1-rc4, cuando reproduce secuencias Real trsp (realrtsp), que permiten a atacantes remotos causar una denegación de servivio (caída) y posiblemente ejecutar código de su eleccion mediante (a) URLs largas, (b) respuestas de servidor Real largas, o (c) paquetes de transporte de datos Real (RDT) largos. • http://security.gentoo.org/glsa/glsa-200405-24.xml http://www.xinehq.de/index.php/security/XSA-2004-3 https://exchange.xforce.ibmcloud.com/vulnerabilities/16019 •

CVSS: 10.0EPSS: 28%CPEs: 17EXPL: 2

Buffer overflow in the HTTP parser for MPlayer 1.0pre3 and earlier, 0.90, and 0.91 allows remote attackers to execute arbitrary code via a long Location header. Desbordamiento de búfer en el procesador HTTP de MPlayer 1.0pre3 y anteriores, 0.90 y 0.91 permite a atacantes ejecutar código arbitrario mediante una cabecera Location larga. • https://www.exploit-db.com/exploits/23896 http://marc.info/?l=bugtraq&m=108067020624076&w=2 http://secunia.com/advisories/11259 http://security.gentoo.org/glsa/glsa-200403-13.xml http://www.kb.cert.org/vuls/id/723910 http://www.mandriva.com/security/advisories?name=MDKSA-2004:026 http://www.mplayerhq.hu/homepage/design6/news.html http://www.securityfocus.com/archive/1/359025 http://www.securityfocus.com/bid/10008 https://exchange.xforce.ibmcloud.com/vulnerabilities/1567 •

CVSS: 7.5EPSS: 13%CPEs: 6EXPL: 1

Multiple buffer overflows in asf_http_request of MPlayer before 0.92 allows remote attackers to execute arbitrary code via an ASX header with a long hostname. Múltiples desbordamientos de búfer en asf_http_request de MPlayer anteriores a 0.92 permite a atacantes remotos ejecutar código arbitrario mediante una cabecera ASX con un nombre de máquina largo. • https://www.exploit-db.com/exploits/23186 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000760 http://marc.info/?l=bugtraq&m=106454257221455&w=2 http://marc.info/?l=bugtraq&m=106460912721618&w=2 http://marc.info/?l=bugtraq&m=106485005213109&w=2 http://www.mplayerhq.hu/homepage/design6/news.html •