A heap-based buffer overflow vulnerability in libmms might allow remote attackers to execute arbitrary code.
Package | media-libs/libmms on all architectures |
---|---|
Affected versions | < 0.6.4 |
Unaffected versions | >= 0.6.4 |
libmms is a library for downloading (streaming) media files using the mmst and mmsh protocols.
A heap-based buffer overflow was discovered in the get_answer function within mmsh.c of libmms.
A remote attacker might send a specially crafted MMS over HTTP (MMSH) response, possibly resulting in the remote execution of arbitrary code with the privileges of the process.
There is no known workaround at this time.
All libmms users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/libmms-0.6.4"
Release date
December 11, 2016
Latest revision
December 11, 2016: 1
Severity
normal
Exploitable
remote
Bugzilla entries