Vulnerability Details : CVE-2006-3355
Heap-based buffer overflow in httpdget.c in mpg123 before 0.59s-rll allows remote attackers to execute arbitrary code via a long URL, which is not properly terminated before being used with the strncpy function. NOTE: This appears to be the result of an incomplete patch for CVE-2004-0982.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-3355
- cpe:2.3:a:mpg123:mpg123:pre0.59s_r11:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3355
14.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-3355
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-3355
-
http://bugs.gentoo.org/show_bug.cgi?id=133988
133988 – media-sound/mpg123-0.59s-r9 heap overflow
-
http://security.gentoo.org/glsa/glsa-200607-01.xml
mpg123: Heap overflow (GLSA 200607-01) — Gentoo securityPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/18794
Jump to