A heap-based buffer over-read in the getbits function in src/libmpg123/getbits.h in mpg123 through 1.25.5 allows remote attackers to cause a possible denial-of-service (out-of-bounds read) or possibly have unspecified other impact via a crafted mp3 file.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.mpg123.de/ | product vendor advisory |
https://sourceforge.net/p/mpg123/bugs/255/ | third party advisory exploit |
https://www.mpg123.de/cgi-bin/scm/mpg123/trunk/src/libmpg123/getbits.h?r1=2024&r2=4323&sortby=date | patch vendor advisory |