--------------------------------------------------------------------------
Debian Security Advisory DSA 564-1                     security@debian.org 
Debian -- Security Information                              Martin Schulze
October 13th, 2004                       Debian -- Debian security FAQ 
--------------------------------------------------------------------------

Package        : mpg123
Vulnerability  : missing user input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-0805
License        : non-free

Davide Del Vecchio discovered a vulnerability mpg123, a popular (but
non-free) MPEG layer 1/2/3 audio player.  A malicious MPEG layer 2/3
file could cause the header checks in mpg123 to fail, which could in
turn allow arbitrary code to be executed with the privileges of the
user running mpg123.

For the stable distribution (woody) this problem has been fixed in
version 0.59r-13woody3.

For the unstable distribution (sid) this problem has been fixed in
version 0.59r-16.

We recommend that you upgrade your mpg123 package.


Upgrade Instructions
--------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
--------------------------------

  Source archives:

      
      Size/MD5 checksum:      748 77cb64c82c3c07b3c418b4cdb3c7a54e
      
      Size/MD5 checksum:    24192 aae8ca014d465adf9e714e5faef260d0
      
      Size/MD5 checksum:   159028 95df59ad1651dd2346d49fafc83747e7

  Alpha architecture:

      
      Size/MD5 checksum:    94482 9ad504920153d01a12d4c7c46e22e73f
      
      Size/MD5 checksum:    94472 2c10a1a915a181c03c814e47785aa695

  ARM architecture:

      
      Size/MD5 checksum:    89640 90f1770883e8ead46b951325648ef4be

  Intel IA-32 architecture:

      
      Size/MD5 checksum:    81516 bc22febb3dd0bc2967cd850b2827838c
      
      Size/MD5 checksum:    81468 4adec8c74c7132a38a1c304ea8ca66d2
      
      Size/MD5 checksum:    83502 72463077c7c4238f7ed6e5e1ac5eaeaa
      
      Size/MD5 checksum:    81186 b4bc8699d4f58657033e0f79c87c652a
      
      Size/MD5 checksum:    87740 67f686c50d87051ebacc8a5840f11ca2

  HP Precision architecture:

      
      Size/MD5 checksum:    97336 5c32e4be18d105d6af3ce2f199d27419

  Motorola 680x0 architecture:

      
      Size/MD5 checksum:    75894 a65575a7b5bdf578b13d585036d8276a

  PowerPC architecture:

      
      Size/MD5 checksum:    88480 4e5d970a0a42cf9a9dd33b6590d33beb
      
      Size/MD5 checksum:    88406 7289b77111d94d2ed2362739939dd9eb

  Sun Sparc architecture:

      
      Size/MD5 checksum:    88650 9549821e52d23b808acd2702ba139ae0


  These files will probably be moved into the stable distribution on
  its next update.

---------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/

Debian: mpg123 arbitrary code exceution fix

October 13, 2004
Davide Del Vecchio discovered a vulnerability mpg123, a popular (but non-free) MPEG layer 1/2/3 audio player

Summary

Davide Del Vecchio discovered a vulnerability mpg123, a popular (but
non-free) MPEG layer 1/2/3 audio player. A malicious MPEG layer 2/3
file could cause the header checks in mpg123 to fail, which could in
turn allow arbitrary code to be executed with the privileges of the
user running mpg123.

For the stable distribution (woody) this problem has been fixed in
version 0.59r-13woody3.

For the unstable distribution (sid) this problem has been fixed in
version 0.59r-16.

We recommend that you upgrade your mpg123 package.


Upgrade Instructions
--------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
--------------...

Read the Full Advisory

Severity
Package : mpg123
CVE ID : CAN-2004-0805

Related News