blob: 18971432a77e9ab6169ecfae483c11cb9e7ad182 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200409-20">
<title>mpg123: Buffer overflow vulnerability</title>
mpg123 decoding routines contain a buffer overflow bug that might
lead to arbitrary code execution.
<product type="ebuild">mpg123</product>
<announced>September 16, 2004</announced>
<revised>September 16, 2004: 01</revised>
<package name="media-sound/mpg123" auto="yes" arch="*">
<unaffected range="ge">0.59s-r4</unaffected>
<vulnerable range="le">0.59s-r3</vulnerable>
mpg123 is a MPEG Audio Player.
mpg123 contains a buffer overflow in the code that handles layer2
decoding of media files.
<impact type="normal">
An attacker can possibly exploit this bug with a specially-crafted mp3 or mp2 file
to execute arbitrary code with the permissions of the user running mpg123.
There is no known workaround at this time.
All mpg123 users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=media-sound/mpg123-0.59s-r4"
# emerge ">=media-sound/mpg123-0.59s-r4"</code>
<uri link="">BugTraq Announcement</uri>
<uri link="">CAN-2004-0805</uri>
<metadata tag="requester" timestamp="Tue, 14 Sep 2004 21:37:49 +0000">
<metadata tag="submitter" timestamp="Wed, 15 Sep 2004 15:59:24 +0000">
<metadata tag="bugReady" timestamp="Wed, 15 Sep 2004 18:43:15 +0000">