[原文]Heap-based buffer overflow in httpdget.c in mpg123 before 0.59s-rll allows remote attackers to execute arbitrary code via a long URL, which is not properly terminated before being used with the strncpy function. NOTE: This appears to be the result of an incomplete patch for CVE-2004-0982.
mpg123 on Gentoo Linux httpdget.c URL Handling Overflow
Remote / Network Access
Loss of Integrity
mpg123 on Gentoo Linux contains an overflow condition in the handling of URLs. The issue is due to an error within httpdget.c not validating user-supplied input. With an overly long URL, a remote attacker can cause a heap-based buffer overflow, resulting in a denial of service or potentially execution of arbitrary code.
It has been reported that this issue has been fixed. Upgrade to version 0.59s-r11, or higher, to address this vulnerability.