Desbordamiento de búfer en mpg123
|
Vulnerability classification
|
Property |
Value |
Confidence level |
Oficial |
Impact |
Obtener acceso |
Dificulty |
Experto |
Required attacker level |
Acceso remoto sin cuenta a un servicio exotico |
System information
|
Property |
Value |
Affected manufacturer |
GNU/Linux |
Affected software |
mpg123-0.59r |
Description
|
Se ha descubierto una vulnerabilidad de desbordamiento de búfer en la versión 0.59r de mpg123. La vulnerabilidad reside en el tratamiento de las cabeceras de archivos mpg3/2.
La explotación de esta vulnerabilidad podría permitir a un atacante remoto la ejecución de código arbitrario mediante un archivo mpg3/2 especialmente diseñado. El código se ejecutará con los privilegios del usuario que intente reproducir el archivo malicioso. |
Solution
|
Actualización de software
mpg123
mpg123-0.59r
http://www.alighieri.org/advisories/advisory-mpg123.txt
Mandrake Linux
Mandrakelinux 9.2
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/mpg123-0.59r-21.1.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/mpg123-0.59r-21.1.92mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/mpg123-0.59r-21.1.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/mpg123-0.59r-21.1.92mdk.src.rpm
Mandrakelinux 10.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/mpg123-0.59r-21.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/mpg123-0.59r-21.1.100mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/mpg123-0.59r-21.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/mpg123-0.59r-21.1.100mdk.src.rpm
Corporate Server 2.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/mpg123-0.59r-21.1.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/mpg123-0.59r-21.1.C21mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/mpg123-0.59r-21.1.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/mpg123-0.59r-21.1.C21mdk.src.rpm
Debian Linux
Debian Linux 3.0
Source
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3.dsc
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3.diff.gz
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_alpha.deb
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0.59r-13woody3_alpha.deb
ARM
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_i386.deb
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0.59r-13woody3_i386.deb
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-nas_0.59r-13woody3_i386.deb
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-oss-3dnow_0.59r-13woody3_i386.deb
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-oss-i486_0.59r-13woody3_i386.deb
HP Precision
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_m68k.deb
PowerPC
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_powerpc.deb
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0.59r-13woody3_powerpc.deb
Sun Sparc
http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody3_sparc.deb |
Standar resources
|
Property |
Value |
CVE |
CAN-2004-0805 |
BID |
NULL |
Other resources
|
Davide Del Vecchio Adv#10
http://www.alighieri.org/advisories/advisory-mpg123.txt
Mandrakesoft Security Advisory MDKSA-2004:100
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:100
Debian Security Advisory DSA 564-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00171.html |
Version history
|
Version |
Comments |
Date |
1.0
|
Aviso emitido
|
2004-09-23
|
1.1
|
Aviso emitido por Debian (DSA 564-1)
|
2004-10-14
|