---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Debian update for mplayer SECUNIA ADVISORY ID: SA32153 VERIFY ADVISORY: http://secunia.com/advisories/32153/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 4.0 http://secunia.com/advisories/product/13844/ Debian GNU/Linux unstable alias sid http://secunia.com/advisories/product/530/ DESCRIPTION: Debian has issued an update for mplayer. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. For more information: SA32045 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5.diff.gz Size/MD5 checksum: 86658 cd099ed406a7c844930c9887d8982a52 http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1.orig.tar.gz Size/MD5 checksum: 10286260 815482129b79cb9390904b145c5def6c http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5.dsc Size/MD5 checksum: 1265 b270973c3ce8e7fbfca6f9cd3eb66425 Architecture independent packages: http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc1-12etch5_all.deb Size/MD5 checksum: 2047298 17e990bdca10c40756b82a9dc5a2e265 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_alpha.deb Size/MD5 checksum: 4707948 f431548b126d4341bb696db81246bdd4 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_amd64.deb Size/MD5 checksum: 4370114 98533d1a687b80c2e0986150f8ce8236 arm architecture (ARM) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_arm.deb Size/MD5 checksum: 4325478 00ad261cf9de27068b7cb734726547b4 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_hppa.deb Size/MD5 checksum: 4384816 343f46588519430c765ea7a715418737 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_i386.deb Size/MD5 checksum: 4421394 88000ce453707cd19da6cc8c197a5333 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_ia64.deb Size/MD5 checksum: 5842440 95e5f58d87ebe234dd448389ce87f009 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_mips.deb Size/MD5 checksum: 4274920 7a4d77fad46563b8ae3714a4a560e9dd mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_mipsel.deb Size/MD5 checksum: 4279550 57fe11ca3fc351267fa209cf6e90a6ff powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_powerpc.deb Size/MD5 checksum: 4342366 043f7ab2732751f06da1eb06220fc613 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_s390.deb Size/MD5 checksum: 4162914 fbbc3861141a158ff4e73f7367ab2b1c sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch5_sparc.deb Size/MD5 checksum: 4038434 a397ab5d30990322dcb76ab23d681f77 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.0~rc2-18. ORIGINAL ADVISORY: DSA-1644-1: http://lists.debian.org/debian-security-announce/2008/msg00235.html OTHER REFERENCES: SA32045: http://secunia.com/advisories/32045/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------