vendor:
mpg123
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer-Overflow
120
CWE
Product Name: mpg123
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Gentoo Linux
2006
mpg123 Remote Buffer-Overflow Vulnerability
The mpg123 application is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application. This issue is specific to a patch applied to the Gentoo Linux version of mpg123. The following commands are sufficient to demonstrate this issue by crashing affected applications: ( echo -ne "HTTP/1.1 302 FoundrLocation: " echo -ne "http://fooooooooooooooooooooooooooooooooooooooooooooooooo/rr" )| nc -lp 8080 & mpg123 http://localhost:8080/
Mitigation:
Upgrade to the latest version of mpg123.