Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 24 Apr 2009 18:30:26 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: mpg123 Signedness Vulnerability


======================================================
Name: CVE-2009-1301
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1301
Reference: MLIST:[mpg123-devel] 20090405 mpg123 1.7.2 is out -- important security fix!
Reference: URL:http://sourceforge.net/mailarchive/message.php?msg_name=20090405211856.41696433%40sunscreen.local
Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=265342
Reference: CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=673696
Reference: GENTOO:GLSA-200904-15
Reference: URL:http://www.gentoo.org/security/en/glsa/glsa-200904-15.xml
Reference: SECUNIA:34587
Reference: URL:http://secunia.com/advisories/34587
Reference: SECUNIA:34748
Reference: URL:http://secunia.com/advisories/34748
Reference: VUPEN:ADV-2009-0936
Reference: URL:http://www.vupen.com/english/advisories/2009/0936

Integer signedness error in the store_id3_text function in the ID3v2
code in mpg123 before 1.7.2 allows remote attackers to cause a denial
of service (out-of-bounds memory access) and possibly execute
arbitrary code via an ID3 tag with a negative encoding value.  NOTE:
some of these details are obtained from third party information.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.