libmms: Remote execution of arbitrary code — GLSA 201612-29

A heap-based buffer overflow vulnerability in libmms might allow remote attackers to execute arbitrary code.

Affected packages

media-libs/libmms on all architectures
Affected versions < 0.6.4
Unaffected versions >= 0.6.4

Background

libmms is a library for downloading (streaming) media files using the mmst and mmsh protocols.

Description

A heap-based buffer overflow was discovered in the get_answer function within mmsh.c of libmms.

Impact

A remote attacker might send a specially crafted MMS over HTTP (MMSH) response, possibly resulting in the remote execution of arbitrary code with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All libmms users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/libmms-0.6.4"
 

References

Release date
December 11, 2016

Latest revision
December 11, 2016: 1

Severity
normal

Exploitable
remote

Bugzilla entries