“A vulnerability found in open-source MPEG audio player mpg123
received a ‘highly critical’ rating Tuesday from security
information provider Secunia.“The software vulnerability may lead to an exploit in which a
specially crafted MP2 or MP3 file could cause a memory problem
called a ‘buffer overflow’ that could allow an attacker to run
malicious code…”
Related Story:
BSD
Today: Experiencing audio with XMMS, splay, kmpg and mpg123(Jul
30, 2000)