CVE-2004-0982

Buffer overflow in the getauthfromURL function in httpget.c in mpg123 pre0.59s and mpg123 0.59r could allow remote attackers or local users to execute arbitrary code via an mp3 file that contains a long string before the @ (at sign) in a URL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mpg123:mpg123:0.59r:*:*:*:*:*:*:*
cpe:2.3:a:mpg123:mpg123:pre0.59s:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109834486312407&w=2 - () http://marc.info/?l=bugtraq&m=109834486312407&w=2 -
References () http://secunia.com/advisories/12908 - () http://secunia.com/advisories/12908 -
References () http://securitytracker.com/id?1011832 - () http://securitytracker.com/id?1011832 -
References () http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt - () http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt -
References () http://www.debian.org/security/2004/dsa-578 - Patch, Vendor Advisory () http://www.debian.org/security/2004/dsa-578 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200410-27.xml - () http://www.gentoo.org/security/en/glsa/glsa-200410-27.xml -
References () http://www.osvdb.org/11023 - () http://www.osvdb.org/11023 -
References () http://www.securityfocus.com/bid/11468 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/11468 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17574 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17574 -

Information

Published : 2005-02-09 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0982

Mitre link : CVE-2004-0982

CVE.ORG link : CVE-2004-0982


JSON object : View

Products Affected

mpg123

  • mpg123