mpg123 package fixed a vulnerability allowing arbitrary code execution via unsanitized input.
Reporter | Title | Published | Views | Family All 21 |
---|---|---|---|---|
Cvelist | CVE-2004-0805 | 20 Oct 200404:00 | – | cvelist |
OpenVAS | Debian Security Advisory DSA 564-1 (mpg123) | 17 Jan 200800:00 | – | openvas |
OpenVAS | FreeBSD Ports: mpg123, mpg123-nas, mpg123-esound | 4 Sep 200800:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200409-20 (mpg123) | 24 Sep 200800:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 564-1 (mpg123) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200409-20 (mpg123) | 24 Sep 200800:00 | – | openvas |
OpenVAS | FreeBSD Ports: mpg123, mpg123-nas, mpg123-esound | 4 Sep 200800:00 | – | openvas |
UbuntuCve | CVE-2004-0805 | 23 Dec 200400:00 | – | ubuntucve |
Debian | [SECURITY] [DSA 564-1] New mpg123 packages fix arbitrary code exceution | 13 Oct 200413:00 | – | debian |
FreeBSD | mpg123 buffer overflow | 16 Aug 200300:00 | – | freebsd |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | all | mpg123 | 0.59r-13woody3 | mpg123_0.59r-13woody3_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo