<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="200410-27"> <title>mpg123: Buffer overflow vulnerabilities</title> <synopsis> Buffer overflow vulnerabilities have been found in mpg123 which could lead to execution of arbitrary code. </synopsis> <product type="ebuild">mpg123</product> <announced>2004-10-27</announced> <revised count="02">2006-05-22</revised> <bug>68343</bug> <access>remote</access> <affected> <package name="media-sound/mpg123" auto="yes" arch="*"> <unaffected range="ge">0.59s-r5</unaffected> <vulnerable range="lt">0.59s-r5</vulnerable> </package> </affected> <background> <p> mpg123 is a MPEG Audio Player. </p> </background> <description> <p> Buffer overflow vulnerabilities in the getauthfromURL() and http_open() functions have been reported by Carlos Barros. Additionally, the Gentoo Linux Sound Team fixed additional boundary checks which were found to be lacking. </p> </description> <impact type="normal"> <p> By enticing a user to open a malicious playlist or URL or making use of a specially-crafted symlink, an attacker could possibly execute arbitrary code with the rights of the user running mpg123. </p> </impact> <workaround> <p> There is no known workaround at this time. </p> </workaround> <resolution> <p> All mpg123 users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=media-sound/mpg123-0.59s-r5"</code> </resolution> <references> <uri link="http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt">Security Advisory by Carlos Barros</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0982">CVE-2004-0982</uri> </references> <metadata tag="requester" timestamp="2004-10-22T21:04:17Z"> koon </metadata> <metadata tag="submitter" timestamp="2004-10-24T17:06:55Z"> vorlon078 </metadata> <metadata tag="bugReady" timestamp="2004-10-26T11:02:34Z"> vorlon078 </metadata> </glsa>