安全研究

安全漏洞
MPlayer sdpplin_parse()函数RTSP整数溢出漏洞

发布日期:2008-03-25
更新日期:2008-04-22

受影响系统:
MPlayer MPlayer 1.0 rc2
描述:
BUGTRAQ  ID: 28851
CVE(CAN) ID: CVE-2008-1558

MPlayer是一款基于Linux的媒体播放程序,支持多种媒体格式。

MPlayer的stream/realrtsp/sdpplin.c文件中的sdpplin_parse()函数存在整数溢出漏洞:

sdpplin_parse_stream()
  desc->stream_id=atoi(buf);
spplin_parse()
  desc->stream[stream->stream_id]=stream;

如果用户所打开的媒体文件中包含有超长的StreamCount SDP参数的话,就可以触发这个溢出,导致执行任意指令。

<*来源:k`sOSe
  
  链接:http://secunia.com/advisories/29515
        http://www.debian.org/security/2008/dsa-1552
        http://security.gentoo.org/glsa/glsa-200805-22.xml
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

http://www.milw0rm.com/exploits/5307

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1552-1)以及相应补丁:
DSA-1552-1:New mplayer packages fix arbitrary code execution
链接:http://www.debian.org/security/2008/dsa-1552

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1.orig.tar.gz
Size/MD5 checksum: 10286260 815482129b79cb9390904b145c5def6c
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3.diff.gz
Size/MD5 checksum:    81742 54e2210e0f0eaa596acf6210b050fb50
http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3.dsc
Size/MD5 checksum:     1265 6ccb62e72b94fa4c797975a36766bb45

Architecture independent packages:

http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc1-12etch3_all.deb
Size/MD5 checksum:  2053074 2a88c44b4fa0e754660948ea7e42b8e4

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_alpha.deb
Size/MD5 checksum:  4707708 444e5067e94888747c62ea39b9ce1938

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_amd64.deb
Size/MD5 checksum:  4372894 8f8fb89d21cfc0d8eb028451208f6fb9

arm architecture (ARM)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_arm.deb
Size/MD5 checksum:  4325350 4ee43a3fa256b3e76aae898df3286ace

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_hppa.deb
Size/MD5 checksum:  4384442 4a9e2e68d4edcccd7f3bd4b08d1ac4c5

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_i386.deb
Size/MD5 checksum:  4421502 c0bfb3da63001b23532ff69750888a8e

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_ia64.deb
Size/MD5 checksum:  5842288 8d1fca3a56bbf0faafb39c6ebefd6c92

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_mips.deb
Size/MD5 checksum:  4274728 b51101e7fa8fb0ab197fd84ea9d36c59

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_mipsel.deb
Size/MD5 checksum:  4278972 bac174ec794adbcf9f9e4cc44951781e

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_powerpc.deb
Size/MD5 checksum:  4342252 2a30381673555b1626c407c5cfad56a3

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_s390.deb
Size/MD5 checksum:  4163070 81d36ad30bdefeaf77c4531fe4db5cb1

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

Gentoo
------
Gentoo已经为此发布了一个安全公告(GLSA-200805-22)以及相应补丁:
GLSA-200805-22:MPlayer: User-assisted execution of arbitrary code
链接:http://security.gentoo.org/glsa/glsa-200805-22.xml

所有MPlayer用户都应升级到最新版本:

    # emerge --sync
    # emerge --ask --oneshot --verbose

MPlayer
-------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.mplayerhq.hu/homepage/design6/news.html

浏览次数:2667
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障