Buffer overflow in the getauthfromURL function in httpget.c in mpg123 pre0.59s and mpg123 0.59r could allow remote attackers or local users to execute arbitrary code via an mp3 file that contains a long string before the @ (at sign) in a URL.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    20 Nov 2024, 23:49
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://marc.info/?l=bugtraq&m=109834486312407&w=2 - | |
| References | () http://secunia.com/advisories/12908 - | |
| References | () http://securitytracker.com/id?1011832 - | |
| References | () http://www.barrossecurity.com/advisories/mpg123_getauthfromurl_bof_advisory.txt - | |
| References | () http://www.debian.org/security/2004/dsa-578 - Patch, Vendor Advisory | |
| References | () http://www.gentoo.org/security/en/glsa/glsa-200410-27.xml - | |
| References | () http://www.osvdb.org/11023 - | |
| References | () http://www.securityfocus.com/bid/11468 - Patch, Vendor Advisory | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17574 - | 
Information
                Published : 2005-02-09 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-0982
Mitre link : CVE-2004-0982
CVE.ORG link : CVE-2004-0982
JSON object : View
Products Affected
                mpg123
- mpg123
 
CWE
                