First published: Thu Sep 15 2022(Updated: )
Certain The MPlayer Project products are vulnerable to Out-of-bounds Read via function read_meta_record() of mplayer/libmpdemux/asfheader.c. This affects mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MPlayerHQ MEncoder | =svn-r38374-13.0.1 | |
Gapless Player SimZip | =svn-r38374-13.0.1 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38851 is classified as a moderate severity vulnerability due to its potential for denial of service through an out-of-bounds read.
To fix CVE-2022-38851, users should update to an unaffected version of MPlayer or MEncoder that resolves this vulnerability.
CVE-2022-38851 affects MPlayer version SVN-r38374-13.0.1 and MEncoder version SVN-r38374-13.0.1.
CVE-2022-38851 represents an out-of-bounds read vulnerability in the read_meta_record function of the ASF header parser.
Yes, CVE-2022-38851 can potentially be exploited remotely if the vulnerable versions of MPlayer or MEncoder are used in a networked environment.