Horst Schirmeier has reported a vulnerability in Gentoo's mpg123 package, which potentially can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a Gentoo specific patch, which fails to terminate strings properly. This can be exploited to cause a heap-based buffer overflow by enticing a user into connecting to a malicious server.
Successful exploitation may allow execution of arbitrary code.
Solution: Update to "media-sound/mpg123-0.59s-r11" or later.
Provided and/or discovered by: Horst Schirmeier
Original Advisory: http://www.gentoo.org/security/en/glsa/glsa-200607-01.xml
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org