Source: mpg123
Version: 0.59f-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>
Control: fixed -1 1.32.8-1

Forwarding this from
<https://www.openwall.com/lists/oss-security/2024/10/30/2>:

> There is possible buffer overflow
> (writing of decoded PCM samples beyond allocated output buffer) for
> streams that change output properties together with certain usage of
> libmpg123. This needed seeking around in the stream (including scanning
> it before actual decoding) to trigger. So, your usual web radio stream
> as obvious attack vector is unlikely, as you won't seek around in it.
> If you do work with stream dumps, usage of MPG123_NO_FRANKENSTEIN or
> the --no-frankenstein option to the mpg123 application is a workaround
> to avoid the formerly dangerous situation in earlier mpg123 releases.
> This also means that mpg123 will not decode streams of concatenated
> files with either varying format or leading Info frames past the first
> track anymore.
…
> Exploitation of this is not trivial, but I cannot rule out the
> possibility of gaining code execution.
…
> Basically any version of mpg123 is affected by this, at least those
> that explicitly support so-called Frankenstein streams.

There is currently no CVE ID allocated.

    smcv

Reply via email to