Vulnerability Description
Heap-based buffer overflow in readstring of httpget.c for mpg123 0.59r and 0.59s allows remote attackers to execute arbitrary code via a long request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mpg123 | Mpg123 | 0.59r |
References
- ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-002.0/CSSA-2004-0
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000781
- http://marc.info/?l=bugtraq&m=106493686331198&w=2
- http://www.debian.org/security/2004/dsa-435PatchVendor Advisory
- http://www.securityfocus.com/archive/1/338641ExploitVendor Advisory
- http://www.securityfocus.com/bid/8680ExploitPatchVendor Advisory
- ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-002.0/CSSA-2004-0
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000781
- http://marc.info/?l=bugtraq&m=106493686331198&w=2
- http://www.debian.org/security/2004/dsa-435PatchVendor Advisory
- http://www.securityfocus.com/archive/1/338641ExploitVendor Advisory
- http://www.securityfocus.com/bid/8680ExploitPatchVendor Advisory
FAQ
What is CVE-2003-0865?
CVE-2003-0865 is a vulnerability with a CVSS score of 7.5 (HIGH). Heap-based buffer overflow in readstring of httpget.c for mpg123 0.59r and 0.59s allows remote attackers to execute arbitrary code via a long request.
How severe is CVE-2003-0865?
CVE-2003-0865 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0865?
Check the references section above for vendor advisories and patch information. Affected products include: Mpg123 Mpg123.