Arbitrary remote code execution under the user ID running the player when streaming an ASF file from a malicious server. PR: ports/93767 Submitted by: "Thomas E. Zander" <riggs@rrr.de> (maintainer) Approved by: portmgr (erwin) Obtained from: mplayer CVS repo: http://www1.mplayerhq.hu/cgi-bin/cvsweb.cgi/main/libmpdemux/demuxer.h.diff?r2=1.90&r1=1.87&f=u Security: heap overflow in the ASF demuxer (http://www.mplayerhq.hu/design7/news.html#vuln13, http://bugs.gentoo.org/show_bug.cgi?id=122029)