Package: mp3info
Version: 0.8.4-9
Severity: normal
Tags: security patch
CVE-2006-2465: "Buffer overflow in MP3Info 0.8.4 allows attackers to
execute arbitrary code via a long command line argument. NOTE: if
mp3info is not installed setuid or setgid in any reasonable context,
then this issue might not be a vulnerability."
I've confirmed this issue appears in 0.8.4-9 and attached a patch that
fixes it. There are other sprintf()s around the source, but since it's
reading the fixed-length ID3 tags I'm not sure there are any
vulnerabilities there.
Please mention the CVE in your changelog.
Thanks,
Alec
--- mp3info.c.orig 2006-05-20 14:39:24.000000000 +0100
+++ mp3info.c 2006-05-20 14:40:02.000000000 +0100
@@ -183,7 +183,7 @@
file_open=0;
if (view_only == 1) {
if ( !( fp=fopen(argv[i],"r") ) ) {
- sprintf(error_msg,"Error opening MP3: %s",argv[i]);
+ snprintf(error_msg,sizeof(error_msg),"Error opening MP3:
%s",argv[i]);
perror(error_msg);
retcode |= 1;
} else {
@@ -191,7 +191,7 @@
}
} else {
if ( !( fp=fopen(argv[i],"rb+") ) ) {
- sprintf(error_msg,"Error opening MP3: %s",argv[i]);
+ snprintf(error_msg,sizeof(error_msg),"Error opening MP3:
%s",argv[i]);
perror(error_msg);
retcode |= 1;
} else {