First published: Thu Oct 31 2024(Updated: )
There's a out-of-bounds write issue in mpg123, the vulnerability is located when handling crafted streams. During the decoding of PCM the libmpg123 may write past the end of a heap located buffer, as consequence heap corruption may happen and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload needs to be validated by the MPEG decoder and by the PCM synth before being executed. Additionally to successfully execute the attack,the user needs to scan through the stream making web live stream content (such as web radios) a very unlikely attack vector.
Affected Software | Affected Version | How to fix |
---|---|---|
mpg123 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2322980 is considered high due to the potential for heap corruption and arbitrary code execution.
To fix REDHAT-BUG-2322980, update to the latest patched version of mpg123 that addresses this vulnerability.
All versions of mpg123 prior to the patched release are potentially affected by REDHAT-BUG-2322980.
Yes, REDHAT-BUG-2322980 can be exploited remotely through crafted streams that trigger the out-of-bounds write condition.
The potential impacts of REDHAT-BUG-2322980 include heap corruption leading to arbitrary code execution, which can compromise system security.