Gentoo Linux Security Advisory GLSA 200803-16 - Multiple vulnerabilities have been discovered in MPlayer, possibly allowing for the remote execution of arbitrary code. Versions less than 1.0_rc2_p25993 are affected.
e5cf9ec774434f48b6875500151b5b3caf3a88165b2a32cf5e2996a048e7bac5
Mandriva Linux Security Advisory - Multiple heap-based buffer overflow vulnerabilities along with various array index flaws allow for arbitrary code execution in mplayer.
f1bcf0cf473fccd78e6b2308c1d9435a3aa262e40d0aead2dc19974921211ce7
Debian Security Advisory 1496-1 - Several buffer overflows have been discovered in the MPlayer movie player, which might lead to the execution of arbitrary code. Felipe Manzano and Anibal Sacco discovered a buffer overflow in the demuxer for MOV files. Reimar Doeffinger discovered a buffer overflow in the FLAC header parsing. Adam Bozanich discovered a buffer overflow in the CDDB access code. Adam Bozanich discovered a buffer overflow in URL parsing.
c361d51d6f24230ed4e54481cadc697f2445ea513792e3be9d71f8ed668a8eb2
Core Security Technologies Advisory - The MPlayer package is vulnerable to an arbitrary pointer dereference vulnerability, which can be exploited by malicious remote attackers to compromise a user's system. The vulnerability is caused by the MPlayer libmpdemux ('demux_mov.c') library not properly sanitizing certain tags on a MOV file before using them to index an array on the heap. This can be exploited to execute arbitrary commands by opening a specially crafted file.
c3dbdf2e8f7ae8c5db2507b176551c4a741b53e50ee9905fe4920754fdc7507c