Check Point Reference: | CPAI-2012-173 |
Date Published: | 30 Apr 2012 |
Severity: | Medium |
Last Updated: | Sunday 23 February, 2025 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | MPlayer for Win32 Project MPlayer All versions |
Vulnerability Description | A remote code execution vulnerability has been reported in MPlayer for Win32. |
Vulnerability Details | The vulnerability is due to an integer overflow while handling specially crafted media files. A remote attacker could exploit this vulnerability by enticing a target user to open a specially crafted media file with a vulnerable version of MPlayer. Successful exploitation would allow attackers to inject and execute arbitrary code on an affected system. |
This protection will detect and block malicious media files.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Media Player Enforcement Violation
Attack Information: MPlayer for Win32 Calloc Integer Overflow