Package: mp3info
Version: 0.8.4-9
Severity: normal
Tags: security patch

CVE-2006-2465: "Buffer overflow in MP3Info 0.8.4 allows attackers to
execute arbitrary code via a long command line argument. NOTE: if
mp3info is not installed setuid or setgid in any reasonable context,
then this issue might not be a vulnerability."

I've confirmed this issue appears in 0.8.4-9 and attached a patch that
fixes it.  There are other sprintf()s around the source, but since it's
reading the fixed-length ID3 tags I'm not sure there are any
vulnerabilities there.

Please mention the CVE in your changelog.

Thanks,

Alec
--- mp3info.c.orig      2006-05-20 14:39:24.000000000 +0100
+++ mp3info.c   2006-05-20 14:40:02.000000000 +0100
@@ -183,7 +183,7 @@
       file_open=0;
       if (view_only == 1) { 
         if ( !( fp=fopen(argv[i],"r") ) ) {
-               sprintf(error_msg,"Error opening MP3: %s",argv[i]);
+               snprintf(error_msg,sizeof(error_msg),"Error opening MP3: 
%s",argv[i]);
                 perror(error_msg);
                retcode |= 1;
         } else {
@@ -191,7 +191,7 @@
        }
       } else {
         if ( !( fp=fopen(argv[i],"rb+") ) ) {
-               sprintf(error_msg,"Error opening MP3: %s",argv[i]);
+               snprintf(error_msg,sizeof(error_msg),"Error opening MP3: 
%s",argv[i]);
                 perror(error_msg);
                retcode |= 1;
         } else {

Reply via email to