7 lines
No EOL
573 B
Text
7 lines
No EOL
573 B
Text
source: https://www.securityfocus.com/bid/11958/info
|
|
|
|
A remote client-side buffer overflow vulnerability affects mpg123. This issue is due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into static process buffers.
|
|
|
|
An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation.
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24852.list |