Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 134371 - media-sound/mpg123: arbitrary code execution from buffer overflow
Summary: media-sound/mpg123: arbitrary code execution from buffer overflow
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
URL: http://www.cve.mitre.org/cgi-bin/cven...
Whiteboard: A2 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2006-05-25 16:50 UTC by Harlan Lieberman-Berg (RETIRED)
Modified: 2006-05-25 17:24 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Harlan Lieberman-Berg (RETIRED) gentoo-dev 2006-05-25 16:50:07 UTC
This affects <=0.59r.  A sample exploit is located at: http://downloads.securityfocus.com/vulnerabilities/exploits/mpg1DoS3.pl

By tricking a user into playing a specially crafted file, an attacker can cause a SEGFAULT. There may also be other impacts.
Comment 1 Tim Yamin (RETIRED) gentoo-dev 2006-05-25 17:24:30 UTC
Tried with 0.59r and it broke; 0.59s doesn't break and we don't have 0.59r in the tree anymore either so bug invalid.