Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-3355Improper Restriction of Operations within the Bounds of a Memory Buffer in Mpg123

6 documents6 sources
Severity
7.5HIGHNVD
CNA10.0OSV10.0
EPSS
9.7%
top 7.08%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJul 6
Latest updateMay 1

Description

Heap-based buffer overflow in httpdget.c in mpg123 before 0.59s-rll allows remote attackers to execute arbitrary code via a long URL, which is not properly terminated before being used with the strncpy function. NOTE: This appears to be the result of an incomplete patch for CVE-2004-0982.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages2 packages

Debianmpg123/mpg123< 0.60-1+3
NVDmpg123/mpg123pre0.59s_r11

Patches

🔴Vulnerability Details

3
GHSA
GHSA-fm9r-pg68-hhrm: Heap-based buffer overflow in httpdget2022-05-01
OSV
CVE-2006-3355: Heap-based buffer overflow in httpdget2006-07-06
CVEList
CVE-2006-3355: Heap-based buffer overflow in httpdget2006-07-06

💥Exploits & PoCs

1
Exploit-DB
Gentoo-Specific MPG123 - URI Remote Buffer Overflow2006-07-03

📋Vendor Advisories

1
Debian
CVE-2006-3355: mpg123 - Heap-based buffer overflow in httpdget.c in mpg123 before 0.59s-rll allows remot...2006
CVE-2006-3355 — Mpg123 vulnerability | cvebase