<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>19859</bug_id>
          
          <creation_ts>2009-04-30 13:37:44 +0400</creation_ts>
          <short_desc>MPlayer TwinVQ Processing Buffer Overflow Vulnerability (CVE-2008-5616)</short_desc>
          <delta_ts>2018-02-15 19:35:01 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>3</classification_id>
          <classification>Distributions</classification>
          <product>Branch 5.0</product>
          <component>mplayer</component>
          <version>unspecified</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>WONTFIX</resolution>
          
          
          <bug_file_loc>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Nobody&apos;s working on this, feel free to take it">nobody</assigned_to>
          <cc>grenka</cc>
          
          <qa_contact name="qa-5.0@altlinux.org">qa-5.0</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>90459</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-04-30 13:37:44 +0400</bug_when>
    <thetext>В mplayer обнаружено переполнение буфера в функции demux_open_vqf() в libmpdemux/demux_vqf.c в MPlayer, позволяющее атакующему выполнить произвольный код через специльно сформированный TwinVQ файл.

Upstream сделал исправление в svn (&gt;=r28150)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>91370</commentid>
    <comment_count>1</comment_count>
    <who name="Afanasov Dmitry">ender</who>
    <bug_when>2009-05-18 10:17:07 +0400</bug_when>
    <thetext>в сизифе закрыто, остались бранчи.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>169047</commentid>
    <comment_count>2</comment_count>
    <who name="Grigory Ustinov">grenka</who>
    <bug_when>2018-02-15 19:35:01 +0300</bug_when>
    <thetext>В 5.0 уже не нужно, думаю.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>