Ubuntu 16.04 ESM : mpg123 vulnerability (USN-4806-1)

high Nessus Plugin ID 183531


The remote Ubuntu host is missing one or more security updates.


The remote Ubuntu 16.04 ESM host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-4806-1 advisory.

- A heap-based buffer over-read in the getbits function in src/libmpg123/getbits.h in mpg123 through 1.25.5 allows remote attackers to cause a possible denial-of-service (out-of-bounds read) or possibly have unspecified other impact via a crafted mp3 file. (CVE-2017-12839)

- Integer overflow in the INT123_parse_new_id3 function in the ID3 parser in mpg123 before 1.25.5 on 32-bit platforms allows remote attackers to cause a denial of service via a crafted file, which triggers a heap- based buffer overflow. (CVE-2017-12797)

- The next_text function in src/libmpg123/id3.c in mpg123 1.24.0 allows remote attackers to cause a denial of service (buffer over-read) via a crafted mp3 file. (CVE-2017-9545)

- The III_i_stereo function in libmpg123/layer3.c in mpg123 through 1.25.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the block_type != 2 case, a similar issue to CVE-2017-9870. (CVE-2017-11126)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Update the affected libmpg123-0, libmpg123-dev and / or mpg123 packages.

See Also


Plugin Details

Severity: High

ID: 183531

File Name: ubuntu_USN-4806-1.nasl

Version: 1.0

Type: local

Agent: unix

Published: 10/20/2023

Updated: 10/20/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information


Risk Factor: Medium

Score: 6.3


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2017-12839


Risk Factor: High

Base Score: 8.3

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:canonical:ubuntu_linux:16.04:-:esm, p-cpe:/a:canonical:ubuntu_linux:libmpg123-0, p-cpe:/a:canonical:ubuntu_linux:libmpg123-dev, p-cpe:/a:canonical:ubuntu_linux:mpg123

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/17/2021

Vulnerability Publication Date: 7/10/2017

Reference Information

CVE: CVE-2017-11126, CVE-2017-12797, CVE-2017-12839, CVE-2017-9545

USN: 4806-1