[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: mpg123 Signedness Vulnerability
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2009-04-24 22:30:26
Message-ID: Pine.GSO.4.51.0904241829440.13343 () faron ! mitre ! org
[Download RAW message or body]


======================================================
Name: CVE-2009-1301
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1301
Reference: MLIST:[mpg123-devel] 20090405 mpg123 1.7.2 is out -- important security fix!
Reference: URL:http://sourceforge.net/mailarchive/message.php?msg_name=20090405211856.41696433%40sunscreen.local
Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=265342
Reference: CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=673696
Reference: GENTOO:GLSA-200904-15
Reference: URL:http://www.gentoo.org/security/en/glsa/glsa-200904-15.xml
Reference: SECUNIA:34587
Reference: URL:http://secunia.com/advisories/34587
Reference: SECUNIA:34748
Reference: URL:http://secunia.com/advisories/34748
Reference: VUPEN:ADV-2009-0936
Reference: URL:http://www.vupen.com/english/advisories/2009/0936

Integer signedness error in the store_id3_text function in the ID3v2
code in mpg123 before 1.7.2 allows remote attackers to cause a denial
of service (out-of-bounds memory access) and possibly execute
arbitrary code via an ID3 tag with a negative encoding value.  NOTE:
some of these details are obtained from third party information.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic