GLSA Bodhisattva
Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Thu Sep 16, 2004 12:48 pm Post subject: [ GLSA 200409-20 ] mpg123: Buffer overflow vulnerability |
|
|
Gentoo Linux Security Advisory
Title: mpg123: Buffer overflow vulnerability (GLSA 200409-20)
Severity: normal
Exploitable: remote
Date: September 16, 2004
Bug(s): #63079
ID: 200409-20
Synopsis
mpg123 decoding routines contain a buffer overflow bug that might
lead to arbitrary code execution.
Background
mpg123 is a MPEG Audio Player.
Affected Packages
Package: media-sound/mpg123
Vulnerable: <= 0.59s-r3
Unaffected: >= 0.59s-r4
Architectures: All supported architectures
Description
mpg123 contains a buffer overflow in the code that handles layer2
decoding of media files.
Impact
An attacker can possibly exploit this bug with a specially-crafted mp3 or mp2 file
to execute arbitrary code with the permissions of the user running mpg123.
Workaround
There is no known workaround at this time.
Resolution
All mpg123 users should upgrade to the latest version:
Code: | # emerge sync
# emerge -pv ">=media-sound/mpg123-0.59s-r4"
# emerge ">=media-sound/mpg123-0.59s-r4" |
References
BugTraq Announcement
CAN-2004-0805
Last edited by GLSA on Sat Feb 21, 2015 4:17 am; edited 5 times in total |
|