CVE-2024-10573

An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
redhatCNA
6.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
Debian logo
Debian Releases
Debian Product
Codename
mpg123
bullseye
vulnerable
bullseye (security)
1.26.4-1+deb11u1
fixed
bookworm
1.31.2-1+deb12u1
fixed
bookworm (security)
1.31.2-1+deb12u1
fixed
sid
1.32.10-1
fixed
trixie
1.32.10-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
mpg123
plucky
Fixed 1.32.8-1
released
oracular
Fixed 1.32.7-1ubuntu0.1
released
noble
Fixed 1.32.5-1ubuntu1.1
released
jammy
Fixed 1.29.3-1ubuntu0.1
released
focal
Fixed 1.25.13-1ubuntu0.2
released
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage