blob: 52f2e0ae6c254dbf735f2f62ce1bc1b461734918 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200501-14">
<title>mpg123: Buffer overflow</title>
An attacker may be able to execute arbitrary code by way of specially
crafted MP2 or MP3 files.
<product type="ebuild">media-sound/mpg123</product>
<announced>January 10, 2005</announced>
<revised>January 10, 2005: 01</revised>
<package name="media-sound/mpg123" auto="yes" arch="*">
<unaffected range="ge">0.59s-r9</unaffected>
<vulnerable range="lt">0.59s-r9</vulnerable>
mpg123 is a real-time MPEG audio player.
mpg123 improperly parses frame headers in input streams.
<impact type="normal">
By inducing a user to play a malicious file, an attacker may be
able to exploit a buffer overflow to execute arbitrary code with the
permissions of the user running mpg123.
There is no known workaround at this time.
All mpg123 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-sound/mpg123-0.59s-r9&quot;</code>
<uri link="">CAN-2004-0991</uri>
<uri link="">Bugtraq Announcement</uri>
<metadata tag="requester" timestamp="Fri, 7 Jan 2005 13:23:00 +0000">
<metadata tag="bugReady" timestamp="Sat, 8 Jan 2005 19:52:22 +0000">
<metadata tag="submitter" timestamp="Sun, 9 Jan 2005 05:27:09 +0000">