oss-sec mailing list archives
Re: CVE request: mpg123 Signedness Vulnerability
From: "Steven M. Christey" <coley () linus mitre org>
Date: Fri, 24 Apr 2009 18:30:26 -0400 (EDT)
====================================================== Name: CVE-2009-1301 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1301 Reference: MLIST:[mpg123-devel] 20090405 mpg123 1.7.2 is out -- important security fix! Reference: URL:http://sourceforge.net/mailarchive/message.php?msg_name=20090405211856.41696433%40sunscreen.local Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=265342 Reference: CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=673696 Reference: GENTOO:GLSA-200904-15 Reference: URL:http://www.gentoo.org/security/en/glsa/glsa-200904-15.xml Reference: SECUNIA:34587 Reference: URL:http://secunia.com/advisories/34587 Reference: SECUNIA:34748 Reference: URL:http://secunia.com/advisories/34748 Reference: VUPEN:ADV-2009-0936 Reference: URL:http://www.vupen.com/english/advisories/2009/0936 Integer signedness error in the store_id3_text function in the ID3v2 code in mpg123 before 1.7.2 allows remote attackers to cause a denial of service (out-of-bounds memory access) and possibly execute arbitrary code via an ID3 tag with a negative encoding value. NOTE: some of these details are obtained from third party information.
Current thread:
- CVE request: mpg123 Signedness Vulnerability Alex Legler (Apr 11)
- Re: CVE request: mpg123 Signedness Vulnerability Steven M. Christey (Apr 24)