Lucene search

K
gentooGentoo FoundationGLSA-200409-20
HistorySep 16, 2004 - 12:00 a.m.

mpg123: Buffer overflow vulnerability

2004-09-1600:00:00
Gentoo Foundation
security.gentoo.org
10

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.116

Percentile

95.3%

Background

mpg123 is a MPEG Audio Player.

Description

mpg123 contains a buffer overflow in the code that handles layer2 decoding of media files.

Impact

An attacker can possibly exploit this bug with a specially-crafted mp3 or mp2 file to execute arbitrary code with the permissions of the user running mpg123.

Workaround

There is no known workaround at this time.

Resolution

All mpg123 users should upgrade to the latest version:

 # emerge sync

 # emerge -pv ">=media-sound/mpg123-0.59s-r4"
 # emerge ">=media-sound/mpg123-0.59s-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-sound/mpg123<= 0.59s-r3UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.116

Percentile

95.3%