Joined: 13 Jun 2003
Location: Dresden, Germany
|Posted: Thu Sep 16, 2004 12:48 pm Post subject: [ GLSA 200409-20 ] mpg123: Buffer overflow vulnerability
|Gentoo Linux Security Advisory
Title: mpg123: Buffer overflow vulnerability (GLSA 200409-20)
Date: September 16, 2004
mpg123 decoding routines contain a buffer overflow bug that might
lead to arbitrary code execution.
mpg123 is a MPEG Audio Player.
Vulnerable: <= 0.59s-r3
Unaffected: >= 0.59s-r4
Architectures: All supported architectures
mpg123 contains a buffer overflow in the code that handles layer2
decoding of media files.
An attacker can possibly exploit this bug with a specially-crafted mp3 or mp2 file
to execute arbitrary code with the permissions of the user running mpg123.
There is no known workaround at this time.
All mpg123 users should upgrade to the latest version:
|# emerge sync
# emerge -pv ">=media-sound/mpg123-0.59s-r4"
# emerge ">=media-sound/mpg123-0.59s-r4"
Last edited by GLSA on Sat Feb 21, 2015 4:17 am; edited 5 times in total