Buffer overflow in the getauthfromURL function in httpget.c in mpg123 pre0.59s and mpg123 0.59r could allow remote attackers or local users to execute arbitrary code via an mp3 file that contains a long string before the @ (at sign) in a URL.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=109834486312407&w=2 - | |
References | () http://secunia.com/advisories/12908 - | |
References | () http://securitytracker.com/id?1011832 - | |
References | () http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt - | |
References | () http://www.debian.org/security/2004/dsa-578 - Patch, Vendor Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200410-27.xml - | |
References | () http://www.osvdb.org/11023 - | |
References | () http://www.securityfocus.com/bid/11468 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17574 - |
Information
Published : 2005-02-09 05:00
Updated : 2024-11-20 23:49
NVD link : CVE-2004-0982
Mitre link : CVE-2004-0982
CVE.ORG link : CVE-2004-0982
JSON object : View
Products Affected
mpg123
- mpg123
CWE