Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stack Buffer Underflow in ogg123 Remote Control |
Fri, 15 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stack Buffer Underflow in ogg123 Remote Control Function | |
| Weaknesses | CWE-681 CWE-787 |
Fri, 15 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xiph
Xiph vorbis-tools |
|
| Vendors & Products |
Xiph
Xiph vorbis-tools |
Fri, 15 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stack Buffer Underflow in ogg123 Remote Control Function | |
| Weaknesses | CWE-681 CWE-787 |
Fri, 15 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-124 | |
| Metrics |
cvssV3_1
|
Fri, 15 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, leading to a stack buffer underflow that can cause application crashes and potentially allow code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-15T15:26:22.404Z
Reserved: 2026-03-26T00:00:00.000Z
Link: CVE-2026-34253
Updated: 2026-05-15T15:26:17.037Z
Status : Received
Published: 2026-05-15T15:16:51.073
Modified: 2026-05-15T16:16:14.190
Link: CVE-2026-34253
No data.
OpenCVE Enrichment
Updated: 2026-05-15T21:00:09Z