Skip to navigation

Security Advisory HelixPlayer security update

Advisory: RHSA-2005:517-02
Type: Security Advisory
Severity: Critical
Issued on: 2005-06-23
Last updated on: 2005-06-23
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2005-1766

Details

An updated HelixPlayer package that fixes a buffer overflow issue is now
available.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

HelixPlayer is a media player.

A buffer overflow bug was found in the way HelixPlayer processes SMIL files.
An attacker could create a specially crafted SMIL file, which when combined
with a malicious web server, could execute arbitrary code when opened by a
user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-1766 to this issue.

All users of HelixPlayer are advised to upgrade to this updated package,
which contains HelixPlayer version 10.0.5 and is not vulnerable to this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
HelixPlayer-1.0.5-0.EL4.1.src.rpm
File outdated by:  RHSA-2010:0094
    MD5: 08f868c1d1b7d9674c8c757438f3bdf3
 
IA-32:
HelixPlayer-1.0.5-0.EL4.1.i386.rpm
File outdated by:  RHSA-2010:0094
    MD5: 679711b03ecb529acd7eae0ed2537fb4
 
x86_64:
HelixPlayer-1.0.5-0.EL4.1.i386.rpm
File outdated by:  RHSA-2010:0094
    MD5: 679711b03ecb529acd7eae0ed2537fb4
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
HelixPlayer-1.0.5-0.EL4.1.src.rpm
File outdated by:  RHSA-2010:0094
    MD5: 08f868c1d1b7d9674c8c757438f3bdf3
 
IA-32:
HelixPlayer-1.0.5-0.EL4.1.i386.rpm
File outdated by:  RHSA-2010:0094
    MD5: 679711b03ecb529acd7eae0ed2537fb4
 
PPC:
HelixPlayer-1.0.5-0.EL4.1.ppc.rpm
File outdated by:  RHSA-2010:0094
    MD5: 7b235efc96792aff7a96a9019763239e
 
x86_64:
HelixPlayer-1.0.5-0.EL4.1.i386.rpm
File outdated by:  RHSA-2010:0094
    MD5: 679711b03ecb529acd7eae0ed2537fb4
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
HelixPlayer-1.0.5-0.EL4.1.src.rpm
File outdated by:  RHSA-2010:0094
    MD5: 08f868c1d1b7d9674c8c757438f3bdf3
 
IA-32:
HelixPlayer-1.0.5-0.EL4.1.i386.rpm
File outdated by:  RHSA-2010:0094
    MD5: 679711b03ecb529acd7eae0ed2537fb4
 
x86_64:
HelixPlayer-1.0.5-0.EL4.1.i386.rpm
File outdated by:  RHSA-2010:0094
    MD5: 679711b03ecb529acd7eae0ed2537fb4
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
HelixPlayer-1.0.5-0.EL4.1.src.rpm
File outdated by:  RHSA-2010:0094
    MD5: 08f868c1d1b7d9674c8c757438f3bdf3
 
IA-32:
HelixPlayer-1.0.5-0.EL4.1.i386.rpm
File outdated by:  RHSA-2010:0094
    MD5: 679711b03ecb529acd7eae0ed2537fb4
 
x86_64:
HelixPlayer-1.0.5-0.EL4.1.i386.rpm
File outdated by:  RHSA-2010:0094
    MD5: 679711b03ecb529acd7eae0ed2537fb4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

159871 - CAN-2005-1766 HelixPlayer heap overflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/