Integer overflow in the INT123parsenew_id3 function in the ID3 parser in mpg123 before 1.25.5 on 32-bit platforms allows remote attackers to cause a denial of service via a crafted file, which triggers a heap-based buffer overflow.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libmpg123-0", "binary_version": "1.25.6-1" }, { "binary_name": "libmpg123-0-dbgsym", "binary_version": "1.25.6-1" }, { "binary_name": "libmpg123-dev", "binary_version": "1.25.6-1" }, { "binary_name": "libout123-0", "binary_version": "1.25.6-1" }, { "binary_name": "libout123-0-dbgsym", "binary_version": "1.25.6-1" }, { "binary_name": "mpg123", "binary_version": "1.25.6-1" }, { "binary_name": "mpg123-dbgsym", "binary_version": "1.25.6-1" } ], "ubuntu_priority": "medium" }