Vulnerability Description
Heap-based buffer overflow in httpdget.c in mpg123 before 0.59s-rll allows remote attackers to execute arbitrary code via a long URL, which is not properly terminated before being used with the strncpy function. NOTE: This appears to be the result of an incomplete patch for CVE-2004-0982.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mpg123 | Mpg123 | pre0.59s_r11 |
References
- http://bugs.gentoo.org/show_bug.cgi?id=133988
- http://secunia.com/advisories/20937Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200607-01.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/18794
- http://bugs.gentoo.org/show_bug.cgi?id=133988
- http://secunia.com/advisories/20937Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200607-01.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/18794
FAQ
What is CVE-2006-3355?
CVE-2006-3355 is a vulnerability with a CVSS score of 7.5 (HIGH). Heap-based buffer overflow in httpdget.c in mpg123 before 0.59s-rll allows remote attackers to execute arbitrary code via a long URL, which is not properly terminated before being used with the strncp...
How severe is CVE-2006-3355?
CVE-2006-3355 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3355?
Check the references section above for vendor advisories and patch information. Affected products include: Mpg123 Mpg123.