MPG123 Malformed MP3 File Memory Corruption Vulnerability
BID:17365
Info
MPG123 Malformed MP3 File Memory Corruption Vulnerability
| Bugtraq ID: | 17365 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2006-1655 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 03 2006 12:00AM |
| Updated: | Nov 29 2006 01:09AM |
| Credit: | Discovery is credited to Nitrous <[email protected]> |
| Vulnerable: |
mpg123 mpg123 0.59 r Mandriva Linux Mandrake 2006.0 x86_64 Mandriva Linux Mandrake 2006.0 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 |
| Not Vulnerable: | |
Discussion
MPG123 Malformed MP3 File Memory Corruption Vulnerability
The mpg123 application is prone to a memory-corruption vulnerability related to the handling of MP3 streams.
An attacker may be able to exploit this vulnerability to execute arbitrary code in the context of the user running the player, but this has not been confirmed.
This issue may be related to the one described in BID 12218 (MPG123 Layer 2 Frame Header Heap Overflow Vulnerability).
The mpg123 application is prone to a memory-corruption vulnerability related to the handling of MP3 streams.
An attacker may be able to exploit this vulnerability to execute arbitrary code in the context of the user running the player, but this has not been confirmed.
This issue may be related to the one described in BID 12218 (MPG123 Layer 2 Frame Header Heap Overflow Vulnerability).
Exploit / POC
MPG123 Malformed MP3 File Memory Corruption Vulnerability
A proof-of-concept denial-of-service exploit is available.
A proof-of-concept denial-of-service exploit is available.
Solution / Fix
MPG123 Malformed MP3 File Memory Corruption Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
Please see the references for third-party vendor advisories and fixes.
mpg123 mpg123 0.59 r
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
Please see the references for third-party vendor advisories and fixes.
mpg123 mpg123 0.59 r
-
Debian mpg123-esd_0.59r-20sarge1_alpha.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0 .59r-20sarge1_alpha.deb -
Debian mpg123-esd_0.59r-20sarge1_i386.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0 .59r-20sarge1_i386.deb -
Debian mpg123-esd_0.59r-20sarge1_powerpc.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0 .59r-20sarge1_powerpc.deb -
Debian mpg123-nas_0.59r-20sarge1_i386.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-nas_0 .59r-20sarge1_i386.deb -
Debian mpg123-oss-3dnow_0.59r-20sarge1_i386.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-oss-3 dnow_0.59r-20sarge1_i386.deb -
Debian mpg123-oss-i486_0.59r-20sarge1_i386.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-oss-i 486_0.59r-20sarge1_i386.deb -
Debian mpg123_0.59r-20sarge1_alpha.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r -20sarge1_alpha.deb -
Debian mpg123_0.59r-20sarge1_arm.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r -20sarge1_arm.deb -
Debian mpg123_0.59r-20sarge1_hppa.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r -20sarge1_hppa.deb -
Debian mpg123_0.59r-20sarge1_i386.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r -20sarge1_i386.deb -
Debian mpg123_0.59r-20sarge1_m68k.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r -20sarge1_m68k.deb -
Debian mpg123_0.59r-20sarge1_powerpc.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r -20sarge1_powerpc.deb -
Debian mpg123_0.59r-20sarge1_sparc.deb
Debian GNU/Linux 3.1 alias sarge
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r -20sarge1_sparc.deb -
Mandriva mpg123-0.59r-22.3.C30mdk.i586.rpm
Mandriva Linux 2006.0:
http://www.mandriva.com/en/download -
Mandriva mpg123-0.59r-22.3.C30mdk.src.rpm
Mandriva Linux 2006.0:
http://www.mandriva.com/en/download -
Mandriva mpg123-0.59r-22.3.C30mdk.x86_64.rpm
Mandriva Linux 2006.0:
http://www.mandriva.com/en/download -
Mandriva mpg123-0.59r-23.1.20060mdk.i586.rpm
Mandriva Linux 2006.0:
http://www.mandriva.com/en/download -
Mandriva mpg123-0.59r-23.1.20060mdk.src.rpm
Mandriva Linux 2006.0:
http://www.mandriva.com/en/download -
Mandriva mpg123-0.59r-23.1.20060mdk.x86_64.rpm
Mandriva Linux 2006.0:
http://www.mandriva.com/en/download