{"id":"DEBIAN-CVE-2004-0805","details":"Buffer overflow in layer2.c in mpg123 0.59r and possibly mpg123 0.59s allows remote attackers to execute arbitrary code via a certain (1) mp3 or (2) mp2 file.","modified":"2025-11-19T01:19:06.970188Z","published":"2004-12-23T05:00:00Z","upstream":["CVE-2004-0805"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2004-0805"}],"affected":[{"package":{"name":"mp3gain","ecosystem":"Debian:11","purl":"pkg:deb/debian/mp3gain?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.2-r2-6"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-0805.json"}},{"package":{"name":"mp3gain","ecosystem":"Debian:12","purl":"pkg:deb/debian/mp3gain?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.2-r2-6"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-0805.json"}},{"package":{"name":"mp3gain","ecosystem":"Debian:13","purl":"pkg:deb/debian/mp3gain?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.2-r2-6"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-0805.json"}},{"package":{"name":"mp3gain","ecosystem":"Debian:14","purl":"pkg:deb/debian/mp3gain?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.2-r2-6"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-0805.json"}},{"package":{"name":"mpg123","ecosystem":"Debian:11","purl":"pkg:deb/debian/mpg123?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.59r-16"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-0805.json"}},{"package":{"name":"mpg123","ecosystem":"Debian:12","purl":"pkg:deb/debian/mpg123?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.59r-16"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-0805.json"}},{"package":{"name":"mpg123","ecosystem":"Debian:13","purl":"pkg:deb/debian/mpg123?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.59r-16"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-0805.json"}},{"package":{"name":"mpg123","ecosystem":"Debian:14","purl":"pkg:deb/debian/mpg123?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.59r-16"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2004-0805.json"}}],"schema_version":"1.7.3"}