Out-of-bounds Write Affecting mpg123 package, versions [,1.32.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-MPG123-8322152
  • published1 Nov 2024
  • disclosed30 Oct 2024
  • creditUnknown

Introduced: 30 Oct 2024

CVE-2024-10573  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade mpg123 to version 1.32.8 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write via the decoding of PCM streams. An attacker can corrupt the heap and potentially execute arbitrary code by sending specially crafted streams that are processed by the MPEG decoder and PCM synth.

Note:

This is only exploitable if the payload is validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector.

CVSS Scores

version 4.0
version 3.1