Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 24 Apr 2009 18:30:26 -0400 (EDT)
From: "Steven M. Christey" <>
Subject: Re: CVE request: mpg123 Signedness Vulnerability

Name: CVE-2009-1301
Status: Candidate
Reference: MLIST:[mpg123-devel] 20090405 mpg123 1.7.2 is out -- important security fix!
Reference: URL:
Reference: CONFIRM:
Reference: CONFIRM:
Reference: GENTOO:GLSA-200904-15
Reference: URL:
Reference: SECUNIA:34587
Reference: URL:
Reference: SECUNIA:34748
Reference: URL:
Reference: VUPEN:ADV-2009-0936
Reference: URL:

Integer signedness error in the store_id3_text function in the ID3v2
code in mpg123 before 1.7.2 allows remote attackers to cause a denial
of service (out-of-bounds memory access) and possibly execute
arbitrary code via an ID3 tag with a negative encoding value.  NOTE:
some of these details are obtained from third party information.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.