Lucene search

K
gentooGentoo FoundationGLSA-200409-20
HistorySep 16, 2004 - 12:00 a.m.

mpg123: Buffer overflow vulnerability

2004-09-1600:00:00
Gentoo Foundation
security.gentoo.org
7

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.116 Low

EPSS

Percentile

95.2%

Background

mpg123 is a MPEG Audio Player.

Description

mpg123 contains a buffer overflow in the code that handles layer2 decoding of media files.

Impact

An attacker can possibly exploit this bug with a specially-crafted mp3 or mp2 file to execute arbitrary code with the permissions of the user running mpg123.

Workaround

There is no known workaround at this time.

Resolution

All mpg123 users should upgrade to the latest version:

 # emerge sync

 # emerge -pv ">=media-sound/mpg123-0.59s-r4"
 # emerge ">=media-sound/mpg123-0.59s-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-sound/mpg123<= 0.59s-r3UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.116 Low

EPSS

Percentile

95.2%