Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.mplayerhq.hu/design7/news.html#vuln13
http://secunia.com/advisories/18718
http://bugs.gentoo.org/show_bug.cgi?id=122029
http://www.vuxml.org/freebsd/104beb63-af4d-11da-8414-0013d4a4a40e.html
Insight
The following packages are affected:
mplayer
mplayer-gtk
mplayer-esound
mplayer-gtk-esound
CVE-2006-0579
Multiple integer overflows in (1) the new_demux_packet function in demuxer.h and (2) the demux_asf_read_packet function in demux_asf.c in MPlayer 1.0pre7try2 and earlier allow remote attackers to execute arbitrary code via an ASF file with a large packet length value.
NOTE: the provenance of this information is unknown portions of the
details are obtained from third party information.
Severity
Classification
-
CVE CVE-2006-0579 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities