Vulnerability Description
Buffer overflow in the asmrp_eval function in the RealMedia RTSP stream handler (asmrp.c) for Real Media input plugin, as used in (1) xine/xine-lib, (2) MPlayer 1.0rc1 and earlier, and possibly others, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a rulebook with a large number of rulematches.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mplayer | Mplayer | <= 1.0_rc1 |
| Xine | Real Media Input Plugin | All versions |
References
- http://secunia.com/advisories/23218
- http://secunia.com/advisories/23242
- http://secunia.com/advisories/23249
- http://secunia.com/advisories/23301
- http://secunia.com/advisories/23335
- http://secunia.com/advisories/23512
- http://secunia.com/advisories/23567
- http://secunia.com/advisories/24336
- http://secunia.com/advisories/24339
- http://secunia.com/advisories/25555
- http://security.gentoo.org/glsa/glsa-200612-02.xml
- http://security.gentoo.org/glsa/glsa-200702-11.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware
- http://sourceforge.net/project/shownotes.php?release_id=468432
- http://www.debian.org/security/2006/dsa-1244
FAQ
What is CVE-2006-6172?
CVE-2006-6172 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the asmrp_eval function in the RealMedia RTSP stream handler (asmrp.c) for Real Media input plugin, as used in (1) xine/xine-lib, (2) MPlayer 1.0rc1 and earlier, and possibly others...
How severe is CVE-2006-6172?
CVE-2006-6172 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6172?
Check the references section above for vendor advisories and patch information. Affected products include: Mplayer Mplayer, Xine Real Media Input Plugin.