Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10573: Out-of-bounds Write

0
Medium
VulnerabilityCVE-2024-10573cvecve-2024-10573
Published: Thu Oct 31 2024 (10/31/2024, 18:31:55 UTC)
Source: CVE Database V5

Description

An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:18:54 UTC

Technical Analysis

CVE-2024-10573 is a medium-severity vulnerability identified in the mpg123 audio decoding library, specifically within the handling of MPEG streams during PCM decoding. The flaw is an out-of-bounds write that occurs when libmpg123 processes crafted audio streams, leading to writes beyond the allocated heap buffer. This heap corruption can destabilize the application and potentially enable arbitrary code execution. However, exploitation complexity is high because the malicious payload must pass validation by both the MPEG decoder and the PCM synthesizer components, which significantly constrains the attack surface. Additionally, exploitation requires user interaction, such as scanning through the malicious stream, making remote exploitation via live web streams (e.g., web radios) improbable. The vulnerability requires at least low-level privileges and user interaction, limiting its scope to local or semi-local attack scenarios. The CVSS 3.1 vector (AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) reflects that the attack vector is local, requires high attack complexity, low privileges, and user interaction, with high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, and no official patches have been linked at the time of publication. Organizations relying on mpg123 for audio decoding in multimedia applications or embedded systems should be aware of this vulnerability and prepare to apply patches once available.

Potential Impact

The primary impact of CVE-2024-10573 is the potential for heap corruption leading to arbitrary code execution within applications using the vulnerable mpg123 library. This could allow attackers to execute malicious code with the privileges of the affected application, potentially leading to data compromise, system instability, or further escalation if combined with other vulnerabilities. However, the high complexity of exploitation and requirement for user interaction reduce the likelihood of widespread exploitation. The vulnerability could affect desktop multimedia players, embedded devices, or any software that integrates mpg123 for audio decoding. Organizations that process untrusted MPEG audio streams locally are at risk, especially if users are tricked into opening crafted files. The lack of known exploits and the complexity required to exploit limit immediate risk but do not eliminate it. If exploited, the confidentiality, integrity, and availability of affected systems could be severely impacted.

Mitigation Recommendations

To mitigate CVE-2024-10573, organizations should: 1) Monitor official mpg123 project channels and security advisories for patches and apply updates promptly once available. 2) Restrict local user privileges to minimize the impact of potential exploitation. 3) Avoid processing untrusted or unauthenticated MPEG audio streams locally, especially from unknown sources. 4) Employ application whitelisting and sandboxing techniques for multimedia applications using mpg123 to contain potential exploitation. 5) Implement network-level controls to prevent delivery of crafted audio streams to end users. 6) Conduct code audits and testing if custom or embedded versions of mpg123 are used to identify and remediate similar issues. 7) Educate users about the risks of opening untrusted media files and scanning through suspicious streams. These targeted mitigations go beyond generic advice by focusing on controlling local user interaction and limiting exposure to crafted audio content.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-10-30T22:56:02.827Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f5c4ee672cd9080e8d49c

Added to database: 11/20/2025, 6:22:06 PM

Last enriched: 2/28/2026, 11:18:54 AM

Last updated: 3/23/2026, 4:18:46 PM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses