Bugzilla – Bug 62474
VUL-0: CVE-2004-0982 : mpg123 buffer overflow while parsing HTTP URLs
Last modified: 2020-08-05 17:57:25 UTC
Hello Vladimir, please have a look at: http://www.barrossecurity.com/advisories/ mpg123_getauthfromurl_bof_advisory.txt
<!-- SBZ_reproduce --> mpg123 -@ http://$(perl -e 'print "A" x 260')@www.somesite.com/somefile.xxx
Created attachment 25313 [details] mpg123-0.59s-http-auth-overflow.patch This patch should fix it. Is it OK?
Yes, looks good. I think it stops the test case mentioned above, did you test?
Yes, this is tested.
Packages are submited for 8.1-9.2 Can you please submit patchinfos?
The second bug wasn't fixed, right? ... sprintf (request + strlen(request), " HTTP/1.0\r\nUser-Agent: %s/%s\r\n", prgName, prgVersion); ...
patchinfo files done.
Hmm, status of the "second bug fix"?
Hello?
patch incomplete, see comment #c6
I think it's missing the patch... Vladimir?
Sorry for the delay. I think this patch is sufficient, isn't it? sprintf (request + strlen(request), " HTTP/1.0\r\nUser-Agent: %s/%s\r\n", - prgName, prgVersion); + "mpg123", prgVersion);
No problem. Yes it's ok. Another way of doing it would be: snprintf(request + strlen(request), sizeof(request)-strlen(request), " HTTP/1.0\r\nUser-Agent: %s/%s\r\n", prgName, prgVersion)
Package submitted
CAN-2004-0982
packages approved