Executive Summary
Summary | |
---|---|
Title | mpv security update |
Informations | |||
---|---|---|---|
Name | DSA-4105 | First vendor Publication | 2018-02-06 |
Vendor | Debian | Last vendor Modification | 2018-02-08 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A regression was detected in the previously issued fix for CVE-2018-6360. The patch released with DSA 4105-1 broke the feature of invoking mpv with raw YouTube ids. This update fixes this functionality issue. For reference, the relevant part of the original advisory text follows. It was discovered that mpv, a media player, was vulnerable to remote code execution attacks. An attacker could craft a malicious web page that, when used as an argument in mpv, could execute arbitrary code in the host of the mpv user. For the stable distribution (stretch), this problem has been fixed in version 0.23.0-2+deb9u2. We recommend that you upgrade your mpv packages. For the detailed security status of mpv please refer to its security tracker page at: https://security-tracker.debian.org/tracker/mpv |
Original Source
Url : http://www.debian.org/security/2018/dsa-4105 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-05-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201805-05.nasl - Type : ACT_GATHER_INFO |
2018-02-12 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_3ee6e5210d3211e899b0d017c2987f9a.nasl - Type : ACT_GATHER_INFO |
2018-02-08 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4105.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2018-02-21 21:22:21 |
|
2018-02-09 05:18:10 |
|
2018-02-07 05:18:12 |
|