Updating the default player for audio file types
If you have a file which does not play with MPlayer, please upload it so we can take a look.
You can find instructions in the Bugreports section of the documentation.
A malicious URL string may be used to trigger a buffer overflow in the program, that can lead to arbitrary code execution with the UID of the user running MPlayer.
High (arbitrary code execution under the user ID running the player) if you can play untrusted URLs (e.g.
SVN HEAD after r25824 (Sun Jan 20 2008 UTC) MPlayer 1.0rc2 security patches A buffer overflow was found and reported by Adam Bozanich of Musecurity in the code used to escape URL strings.
The code used to skip over IPv6 addresses can be tricked into leaving a pointer to a temporary buffer with a non-NULL value; this causes the unescape code to reuse the buffer, and may lead to a buffer overflow if the old buffer is smaller than required.
Please be kind to our server and use one of our many mirrors.
A buffer overflow was found and reported by Adam Bozanich of Musecurity in the code used to extract album titles from CDDB server answers.
A malicious database entry could trigger a buffer overflow in the program.
Please note that it is possible to overwrite entries in the CDDB database, so an attack can also be performed via a non-compromised server.