CVE-2006-3355

NameCVE-2006-3355
DescriptionHeap-based buffer overflow in httpdget.c in mpg123 before 0.59s-rll allows remote attackers to execute arbitrary code via a long URL, which is not properly terminated before being used with the strncpy function. NOTE: This appears to be the result of an incomplete patch for CVE-2004-0982.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs377264

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mpg123 (PTS)jessie1.20.1-2+deb8u1fixed
stretch (lts), stretch1.23.8-1+deb9u1fixed
buster, buster (lts)1.25.10-2+deb10u1fixed
bullseye1.26.4-1fixed
bullseye (security)1.26.4-1+deb11u1fixed
bookworm1.31.2-1fixed
bookworm (security)1.31.2-1+deb12u1fixed
trixie1.32.9-1fixed
sid1.32.10-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mpg123source(unstable)0.60-1medium377264

Notes

[sarge] - mpg123 <no-dsa> (Non-free not supported)

Search for package or bug name: Reporting problems