Mandrake Linux Security Advisory : mpg123 (MDKSA-2004:120)

critical Nessus Plugin ID 15600

Synopsis

The remote Mandrake Linux host is missing a security update.

Description

Carlos Barros discovered two buffer overflow vulnerabilities in mpg123; the first in the getauthfromURL() function and the second in the http_open() function. These vulnerabilities could be exploited to possibly execute arbitrary code with the privileges of the user running mpg123.

The provided packages are patched to fix these issues, as well additional boundary checks that were lacking have been included (thanks to the Gentoo Linux Sound Team for these additional fixes).

Solution

Update the affected mpg123 package.

See Also

http://www.nessus.org/u?baa56ffe

Plugin Details

Severity: Critical

ID: 15600

File Name: mandrake_MDKSA-2004-120.nasl

Version: 1.18

Type: local

Published: 11/2/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:mpg123, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:10.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 11/1/2004

Reference Information

CVE: CVE-2004-0982

MDKSA: 2004:120