Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:MPG123-STEREO-OF

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

mpg123 Remote Stereo Boundary Buffer Overflow

Release Date

2005/01/19

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: mpg123 Remote Stereo Boundary Buffer Overflow


This signature detects the download of a maliciously crafted MPEG Audio file. If attackers can cause a host to read such a file using MPG123, they can execute arbitrary code on the target host.

Extended Description

Reportedly mpg123 is affected by a remote stereo boundary buffer overflow vulnerability. This issue is due to a failure of the application to properly validate user-supplied string sizes prior to copying them into process buffers. This issue will allow a malicious user to manipulate process memory ultimately leading to arbitrary code execution in the context of the user that started the vulnerable application.

Affected Products

  • Mandriva Corporate Server 2.1.0
  • Mandriva Corporate Server 2.1.0 X86 64
  • Mandriva Linux Mandrake 10.0.0
  • Mandriva Linux Mandrake 10.0.0 amd64
  • Mandriva Linux Mandrake 9.2.0
  • Mandriva Linux Mandrake 9.2.0 amd64
  • mpg123 0.59.0 r
  • mpg123 0.59.0 s

References

  • BugTraq: 11121
  • CVE: CVE-2004-0805
  • URL: http://www.securityfocus.com/archive/1/374433

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out