Debian Security Advisory
DSA-826-1 helix-player -- multiple vulnerabilities
- Date Reported:
- 29 Sep 2005
- Affected Packages:
- helix-player
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 316276, Bug 330364.
In Mitre's CVE dictionary: CVE-2005-1766, CVE-2005-2710. - More information:
-
Multiple security vulnerabilities have been identified in the helix-player media player that could allow an attacker to execute code on the victim's machine via specially crafted network resources.
- CAN-2005-1766
Buffer overflow in the RealText parser could allow remote code execution via a specially crafted RealMedia file with a long RealText string.
- CAN-2005-2710
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the image handle attribute in a RealPix (.rp) or RealText (.rt) file.
For the stable distribution (sarge), these problems have been fixed in version 1.0.4-1sarge1
For the unstable distribution (sid), these problems have been fixed in version 1.0.6-1
We recommend that you upgrade your helix-player package.
helix-player was distributed only on the i386 and powerpc architectures
- CAN-2005-1766
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4-1sarge1.dsc
- http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4-1sarge1.diff.gz
- http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4.orig.tar.gz
- http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4-1sarge1.diff.gz
- Intel IA-32:
- http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4-1sarge1_i386.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4-1sarge1_powerpc.deb
MD5 checksums of the listed files are available in the original advisory.