Out-of-bounds Write Affecting mpg123 package, versions [,1.32.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UNMANAGED-MPG123-8322152
  • published 1 Nov 2024
  • disclosed 30 Oct 2024
  • credit Unknown

How to fix?

Upgrade mpg123 to version 1.32.8 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write via the decoding of PCM streams. An attacker can corrupt the heap and potentially execute arbitrary code by sending specially crafted streams that are processed by the MPEG decoder and PCM synth.

Note:

This is only exploitable if the payload is validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
5.4 medium
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    Present
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    Active
  • Confidentiality (VC)
    High
  • Integrity (VI)
    High
  • Availability (VA)
    High
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None