CVE编号
CVE-2007-6718利用情况
暂无补丁情况
没有补丁披露时间
2008-10-21漏洞描述
MPlayer, possibly 1.0rc1, allows remote attackers to cause a denial of service (SIGSEGV and application crash) via (1) a malformed MP3 file, as demonstrated by lol-mplayer.mp3; (2) a malformed Ogg Vorbis file, as demonstrated by lol-mplayer.ogg; (3) a malformed MPEG-1 file, as demonstrated by lol-mplayer.mpg; (4) a malformed MPEG-2 file, as demonstrated by lol-mplayer.m2v; (5) a malformed MPEG-4 AVI file, as demonstrated by lol-mplayer.avi; (6) a malformed FLAC file, as demonstrated by lol-mplayer.flac; (7) a malformed Ogg Theora file, as demonstrated by lol-mplayer.ogm; (8) a malformed WMV file, as demonstrated by lol-mplayer.wmv; or (9) a malformed AAC file, as demonstrated by lol-mplayer.aac. NOTE: vector 5 might overlap CVE-2007-4938, and vector 6 might overlap CVE-2008-0486.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://sam.zoy.org/blog/2007-01-16-exposing-file-parsing-vulnerabilities | |
http://www.openwall.com/lists/oss-security/2008/10/07/1 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | * |
Up to (including) 1.0_rc1 |
|||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 0.90 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 0.90_pre | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 0.90_rc | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 0.90_rc4 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 0.91 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 0.92 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 0.92.1 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 0.92_cvs | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre1 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre2 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre3 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre3try2 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre4 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre5 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre5try1 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre5try2 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre6 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre7 | - | |||||
运行在以下环境 | |||||||||
应用 | mplayer | mplayer | 1.0_pre7try2 | - | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_12.04_lts | mplayer | * |
Up to (excluding) 2:1.0rc4.dfsg1+svn34540-1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | mplayer | * |
Up to (excluding) 2:1.0rc4.dfsg1+svn34540-1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | mplayer | * |
Up to (excluding) 2:1.0rc4.dfsg1+svn34540-1 |
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 没有补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 DoS
- 全网数量 N/A
还没有评论,来说两句吧...