[SECURITY] [DSA 578-1] New mpg123 packages fix arbitrary code execution

From: Martin Schulze (joey_at_infodrom.org)
Date: 11/01/04

  • Next message: Martin Schulze: "[SECURITY] [DSA 579-1] New abiword packages fix arbitrary code execution"
    Date: Mon, 1 Nov 2004 14:33:16 +0100 (CET)
    To: bugtraq@securityfocus.com
    
    

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 578-1 security@debian.org
    http://www.debian.org/security/ Martin Schulze
    November 1st, 2004 http://www.debian.org/security/faq
    - --------------------------------------------------------------------------

    Package : mpg123
    Vulnerability : buffer overflow
    Problem-Type : remote
    Debian-specific: no
    CVE ID : CAN-2004-0982

    Carlos Barros has discovered a buffer overflow in the HTTP
    authentication routine of mpg123, a popular (but non-free) MPEG layer
    1/2/3 audio player. If a user opened a malicious playlist or URL, an
    attacker might execute arbitrary code with the rights of the calling
    user.

    For the stable distribution (woody) this problem has been fixed in
    version 0.59r-13woody4.

    For the unstable distribution (sid) this problem has been fixed in
    version 0.59r-17.

    We recommend that you upgrade your mpg123 package.

    Upgrade Instructions
    - --------------------

    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.

    If you are using the apt-get package manager, use the line for
    sources.list as given below:

    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages

    You may use an automated update by adding the resources from the
    footer to the proper configuration.

    Debian GNU/Linux 3.0 alias woody
    - --------------------------------

      Source archives:

        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody4.dsc
          Size/MD5 checksum: 748 386de2941605795a833ccdddf200f26b
        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody4.diff.gz
          Size/MD5 checksum: 24568 bf98712baa4bb429768762ea9c20404a
        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r.orig.tar.gz
          Size/MD5 checksum: 159028 95df59ad1651dd2346d49fafc83747e7

      Alpha architecture:

        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody4_alpha.deb
          Size/MD5 checksum: 94630 18738b85cf26807ea4d29b1c82767d63
        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0.59r-13woody4_alpha.deb
          Size/MD5 checksum: 94590 f550ba5af79ae1bf5f8024178c391e0c

      ARM architecture:

        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody4_arm.deb
          Size/MD5 checksum: 89708 6b5bc7522cf6e91c7ec21662f8809bc3

      Intel IA-32 architecture:

        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody4_i386.deb
          Size/MD5 checksum: 81688 9c5fb2322632dc72d64e18ec404abad8
        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0.59r-13woody4_i386.deb
          Size/MD5 checksum: 81642 a06e8185f9b0da320ab46c348e55be5a
        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-nas_0.59r-13woody4_i386.deb
          Size/MD5 checksum: 83626 a00b78f948d8967ec23cb2874847f638
        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-oss-3dnow_0.59r-13woody4_i386.deb
          Size/MD5 checksum: 81334 204b7db5b537d81741f04dee9bf80a40
        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-oss-i486_0.59r-13woody4_i386.deb
          Size/MD5 checksum: 87940 0c9d0b30b8a832f30de5cc3d29c321b0

      HP Precision architecture:

        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody4_hppa.deb
          Size/MD5 checksum: 97516 428e9dd2c7805424976c82f7aa37e54b

      Motorola 680x0 architecture:

        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody4_m68k.deb
          Size/MD5 checksum: 75998 b08ad56ec624c0f8a3624596cef423ea

      PowerPC architecture:

        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody4_powerpc.deb
          Size/MD5 checksum: 88528 442b5e1d2462121fcfb1c4eda82429f3
        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123-esd_0.59r-13woody4_powerpc.deb
          Size/MD5 checksum: 88448 d885597a3cb24ae2d92309def283ab5b

      Sun Sparc architecture:

        http://security.debian.org/pool/updates/non-free/m/mpg123/mpg123_0.59r-13woody4_sparc.deb
          Size/MD5 checksum: 88776 b905ba3b69cc2196cc9d84ddefb9b16b

      These files will probably be moved into the stable distribution on
      its next update.

    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: debian-security-announce@lists.debian.org
    Package info: `apt-cache show <pkg>' and http://packages.debian.org/>

    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.5 (GNU/Linux)

    iD8DBQFBhjsbW5ql+IAeqTIRApHrAJ4m83ekW9Gm+H/Ke4sp+RMASjwjbwCfYUU1
    ro+9qiQHpADqYb3mbusTkg8=
    =YBAn
    -----END PGP SIGNATURE-----


  • Next message: Martin Schulze: "[SECURITY] [DSA 579-1] New abiword packages fix arbitrary code execution"

    Relevant Pages