- Issued:
- 2005-03-03
- Updated:
- 2005-03-03
RHSA-2005:271 - Security Advisory
Synopsis
HelixPlayer security update
Type/Severity
Security Advisory: Critical
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated HelixPlayer package that fixes two buffer overflow issues is now
available.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Description
HelixPlayer is a media player.
A stack based buffer overflow bug was found in HelixPlayer's Synchronized
Multimedia Integration Language (SMIL) file processor. An attacker could
create a specially crafted SMIL file which would execute arbitrary code
when opened by a user. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0455 to this issue.
A buffer overflow bug was found in the way HelixPlayer decodes WAV files.
An attacker could create a specially crafted WAV file which could execute
arbitrary code when opened by a user. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-0611 to
this issue.
All users of HelixPlayer are advised to upgrade to this updated package,
which contains HelixPlayer 1.0.3 which is not vulnerable to these
issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 150098 - CAN-2005-0455 buffer overflow in helixplayer
- BZ - 150103 - CAN-2005-0611 .wav overflow in helixplayer
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
HelixPlayer-1.0.3-1.src.rpm | SHA-256: 3a40d12868ae8c43f5ce8edfa7af259f73e822b1de1657fcc6ef747c0c24f385 |
x86_64 | |
HelixPlayer-1.0.3-1.i386.rpm | SHA-256: 808b06c285841707cd1de140354fd674ed3635ebacf42318a9f57e075ee040b5 |
HelixPlayer-1.0.3-1.i386.rpm | SHA-256: 808b06c285841707cd1de140354fd674ed3635ebacf42318a9f57e075ee040b5 |
i386 | |
HelixPlayer-1.0.3-1.i386.rpm | SHA-256: 808b06c285841707cd1de140354fd674ed3635ebacf42318a9f57e075ee040b5 |
HelixPlayer-1.0.3-1.i386.rpm | SHA-256: 808b06c285841707cd1de140354fd674ed3635ebacf42318a9f57e075ee040b5 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
HelixPlayer-1.0.3-1.src.rpm | SHA-256: 3a40d12868ae8c43f5ce8edfa7af259f73e822b1de1657fcc6ef747c0c24f385 |
x86_64 | |
HelixPlayer-1.0.3-1.i386.rpm | SHA-256: 808b06c285841707cd1de140354fd674ed3635ebacf42318a9f57e075ee040b5 |
i386 | |
HelixPlayer-1.0.3-1.i386.rpm | SHA-256: 808b06c285841707cd1de140354fd674ed3635ebacf42318a9f57e075ee040b5 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
HelixPlayer-1.0.3-1.src.rpm | SHA-256: 3a40d12868ae8c43f5ce8edfa7af259f73e822b1de1657fcc6ef747c0c24f385 |
x86_64 | |
HelixPlayer-1.0.3-1.i386.rpm | SHA-256: 808b06c285841707cd1de140354fd674ed3635ebacf42318a9f57e075ee040b5 |
i386 | |
HelixPlayer-1.0.3-1.i386.rpm | SHA-256: 808b06c285841707cd1de140354fd674ed3635ebacf42318a9f57e075ee040b5 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
HelixPlayer-1.0.3-1.src.rpm | SHA-256: 3a40d12868ae8c43f5ce8edfa7af259f73e822b1de1657fcc6ef747c0c24f385 |
ppc | |
HelixPlayer-1.0.3-1.ppc.rpm | SHA-256: a830ba8bed8899d05cf7e3cea671419d0fd3ea19530fe3869a5f4d2e3f2562ed |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.