Joined: 12 May 2004
|Posted: Thu Apr 16, 2009 10:26 pm Post subject: [ GLSA 200904-15 ] mpg123: User-assisted execution of arbitr
|Gentoo Linux Security Advisory
Title: mpg123: User-assisted execution of arbitrary code (GLSA 200904-15)
Date: April 16, 2009
An error in mpg123 might allow for the execution of arbitrary code.
mpg123 is a realtime MPEG 1.0/2.0/2.5 audio player for layers 1, 2 and 3.
Vulnerable: < 1.7.2
Unaffected: >= 1.7.2
Architectures: All supported architectures
The vendor reported a signedness error in the store_id3_text() function in id3.c, allowing for out-of-bounds memory access.
A remote attacker could entice a user to open an MPEG-1 Audio Layer 3 (MP3) file containing a specially crafted ID3 tag, possibly resulting in the execution of arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All mpg123 users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-sound/mpg123-1.7.2"