Secunia Security Advisory SA10544 - A vulnerability has been identified in mpg321, allowing malicious people to execute arbitrary code. The problem is that certain strings in mp3 files are not properly verified before being used in a printf() function call. This could potentially be exploited to execute arbitrary code through malicious mp3 files and HTTP streams.
78644f6aea25c8c32857c7a3337c4341fad3091687c4600a62cc20379ac2d75c
TITLE:
mpg321 Remotely Exploitable Vulnerability
SECUNIA ADVISORY ID:
SA10544
VERIFY ADVISORY:
http://www.secunia.com/advisories/10544/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
From remote
SOFTWARE:
mpg321 0.x
DESCRIPTION:
A vulnerability has been identified in mpg321, allowing malicious
people to execute arbitrary code.
The problem is that certain strings in mp3 files aren't properly
verified before being used in a "printf()" function call. This could
potentially be exploited to execute arbitrary code through malicious
mp3 files and HTTP streams.
SOLUTION:
No update is a available; use a different product.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://www.secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://www.secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------