This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing a security update.
Carlos Barros discovered two buffer overflow vulnerabilities in
mpg123; the first in the getauthfromURL() function and the second in
the http_open() function. These vulnerabilities could be exploited to
possibly execute arbitrary code with the privileges of the user
The provided packages are patched to fix these issues, as well
additional boundary checks that were lacking have been included
(thanks to the Gentoo Linux Sound Team for these additional fixes).
See also :
Update the affected mpg123 package.
Risk factor :
Critical / CVSS Base Score : 10.0