mplayer -- twinvq processing buffer overflow vulnerability

Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades. http://secunia.com/advisories/33136/ http://trapkit.de/advisories/TKADV2008-014.txt http://www.vuxml.org/freebsd/7c5bd5b8-d652-11dd-a765-0030843d3802.html
Insight
The following packages are affected: mplayer mplayer-esound mplayer-gtk mplayer-gtk-esound mplayer-gtk2 mplayer-gtk2-esound CVE-2008-5616 Stack-based buffer overflow in the demux_open_vqf function in libmpdemux/demux_vqf.c in MPlayer 1.0 rc2 before r28150 allows remote attackers to execute arbitrary code via a malformed TwinVQ file.