Search criteria

33 vulnerabilities found for libmodplug by konstanty_bialkowski

FKIE_CVE-2013-4234

Vulnerability from fkie_nvd - Published: 2013-09-16 19:14 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28F70B42-70EB-46B7-8A42-BDB74DA89753",
              "versionEndIncluding": "0.8.8.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD56CB5-038F-45A9-AE9B-489186624232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E92586-2A99-45B5-8A78-5E35F1CF4FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6BFC6E-7932-49F7-A917-34B53474A4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5406CCC-DD17-402A-996C-A1CCA558F27B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "854AB57C-5B41-4B35-92B8-38E233F5991B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42E9A3-02BB-4505-AFE4-E3A987B53C27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basados en memoria din\u00e1mica en las funciones abc_MIDI_drum y abc_MIDI_gchord en libmodplug 0.8.8.4 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda)  y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una ABC manipulada."
    }
  ],
  "id": "CVE-2013-4234",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-09-16T19:14:39.007",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54388"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54695"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2751"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/61714"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54388"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/61714"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-4233

Vulnerability from fkie_nvd - Published: 2013-09-16 19:14 - Updated: 2025-04-11 00:51
Severity ?
Summary
Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28F70B42-70EB-46B7-8A42-BDB74DA89753",
              "versionEndIncluding": "0.8.8.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD56CB5-038F-45A9-AE9B-489186624232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E92586-2A99-45B5-8A78-5E35F1CF4FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6BFC6E-7932-49F7-A917-34B53474A4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5406CCC-DD17-402A-996C-A1CCA558F27B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "854AB57C-5B41-4B35-92B8-38E233F5991B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42E9A3-02BB-4505-AFE4-E3A987B53C27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n abc_set_parts de load_abc.cpp en libmodplug 0.8.8.4 y anteriores permite a un atacante remoto causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo a discrecci\u00f3n a trav\u00e9s de la cabecera P en un archivo ABC, lo que dispara un desbordamiento de memoria din\u00e1mica."
    }
  ],
  "id": "CVE-2013-4233",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-09-16T19:14:38.990",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54388"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54695"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2751"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54388"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-2914

Vulnerability from fkie_nvd - Published: 2012-06-07 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples.
References
secalert@redhat.comhttp://jira.atheme.org/browse/AUDPLUG-394
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
secalert@redhat.comhttp://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2011-1264.html
secalert@redhat.comhttp://secunia.com/advisories/45131Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45658Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45742Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45901Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46032Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46043Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46793Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48058Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48434Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48439Vendor Advisory
secalert@redhat.comhttp://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
secalert@redhat.comhttp://ubuntu.com/usn/usn-1255-1
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2415
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/10/4
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/12/4
secalert@redhat.comhttp://www.osvdb.org/74211
secalert@redhat.comhttp://www.securityfocus.com/bid/48979
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/68985
af854a3a-2127-422b-91ae-364da2661108http://jira.atheme.org/browse/AUDPLUG-394
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
af854a3a-2127-422b-91ae-364da2661108http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2011-1264.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45131Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45658Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45742Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45901Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46032Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46043Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46793Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48058Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48434Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48439Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1255-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2415
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/10/4
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/12/4
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/74211
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48979
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/68985

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "480F3134-72C6-49E1-A424-70712715E0B9",
              "versionEndIncluding": "0.8.8.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD56CB5-038F-45A9-AE9B-489186624232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E92586-2A99-45B5-8A78-5E35F1CF4FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6BFC6E-7932-49F7-A917-34B53474A4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5406CCC-DD17-402A-996C-A1CCA558F27B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "854AB57C-5B41-4B35-92B8-38E233F5991B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples."
    },
    {
      "lang": "es",
      "value": "Error de superaci\u00f3n de l\u00edmite (off-by-one)  en la funci\u00f3n de CSoundFile::ReadDSM en src/load_dms.cpp en libmodplug antes de v0.8.8.4 permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo DSM dise\u00f1ado con un gran n\u00famero de muestras."
    }
  ],
  "id": "CVE-2011-2914",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-07T19:55:04.557",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/74211"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/74211"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-2911

Vulnerability from fkie_nvd - Published: 2012-06-07 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow.
References
secalert@redhat.comhttp://jira.atheme.org/browse/AUDPLUG-394
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
secalert@redhat.comhttp://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2011-1264.html
secalert@redhat.comhttp://secunia.com/advisories/45131Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45658Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45742Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45901Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46032Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46043Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46793Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48058Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48434Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48439Vendor Advisory
secalert@redhat.comhttp://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
secalert@redhat.comhttp://ubuntu.com/usn/usn-1255-1
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2415
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/10/4
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/12/4
secalert@redhat.comhttp://www.osvdb.org/74208
secalert@redhat.comhttp://www.securityfocus.com/bid/48979
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/68983
af854a3a-2127-422b-91ae-364da2661108http://jira.atheme.org/browse/AUDPLUG-394
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
af854a3a-2127-422b-91ae-364da2661108http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2011-1264.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45131Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45658Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45742Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45901Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46032Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46043Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46793Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48058Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48434Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48439Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1255-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2415
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/10/4
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/12/4
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/74208
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48979
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/68983

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "480F3134-72C6-49E1-A424-70712715E0B9",
              "versionEndIncluding": "0.8.8.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD56CB5-038F-45A9-AE9B-489186624232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E92586-2A99-45B5-8A78-5E35F1CF4FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6BFC6E-7932-49F7-A917-34B53474A4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5406CCC-DD17-402A-996C-A1CCA558F27B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "854AB57C-5B41-4B35-92B8-38E233F5991B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n CSoundFile::ReadWav en src/load_wav.cpp en libmodplug antes de v0.8.8.4 permite a atacantes remotos causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo WAV dise\u00f1ado, lo que provoca un desbordamiento de b\u00fafer basado en memoria din\u00e1mica."
    }
  ],
  "id": "CVE-2011-2911",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-06-07T19:55:04.290",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/74208"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68983"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/74208"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68983"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-2913

Vulnerability from fkie_nvd - Published: 2012-06-07 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples.
References
secalert@redhat.comhttp://jira.atheme.org/browse/AUDPLUG-394
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
secalert@redhat.comhttp://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2011-1264.html
secalert@redhat.comhttp://secunia.com/advisories/45131Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45658Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45742Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45901Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46032Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46043Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46793Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48058Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48434Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48439Vendor Advisory
secalert@redhat.comhttp://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
secalert@redhat.comhttp://ubuntu.com/usn/usn-1255-1
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2415
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/10/4
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/12/4
secalert@redhat.comhttp://www.osvdb.org/74210
secalert@redhat.comhttp://www.securityfocus.com/bid/48979
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/68985
af854a3a-2127-422b-91ae-364da2661108http://jira.atheme.org/browse/AUDPLUG-394
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
af854a3a-2127-422b-91ae-364da2661108http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2011-1264.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45131Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45658Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45742Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45901Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46032Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46043Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46793Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48058Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48434Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48439Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1255-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2415
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/10/4
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/12/4
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/74210
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48979
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/68985

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "480F3134-72C6-49E1-A424-70712715E0B9",
              "versionEndIncluding": "0.8.8.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD56CB5-038F-45A9-AE9B-489186624232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E92586-2A99-45B5-8A78-5E35F1CF4FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6BFC6E-7932-49F7-A917-34B53474A4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5406CCC-DD17-402A-996C-A1CCA558F27B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "854AB57C-5B41-4B35-92B8-38E233F5991B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples."
    },
    {
      "lang": "es",
      "value": "Error de superaci\u00f3n de l\u00edmite (off-by-one) en la funci\u00f3n de CSoundFile::ReadAMS en src/load_ams.cpp en libmodplug antes de v0.8.8.4 permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de la pila de memoria) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo dise\u00f1ado con AMS un gran n\u00famero de muestras."
    }
  ],
  "id": "CVE-2011-2913",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-06-07T19:55:04.477",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/74210"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/74210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-2915

Vulnerability from fkie_nvd - Published: 2012-06-07 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Off-by-one error in the CSoundFile::ReadAMS2 function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of instruments.
References
secalert@redhat.comhttp://jira.atheme.org/browse/AUDPLUG-394
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
secalert@redhat.comhttp://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2011-1264.html
secalert@redhat.comhttp://secunia.com/advisories/45131Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45658Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45742Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45901Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46032Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46043Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46793Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48058Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48434Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48439Vendor Advisory
secalert@redhat.comhttp://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
secalert@redhat.comhttp://ubuntu.com/usn/usn-1255-1
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2415
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/10/4
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/12/4
secalert@redhat.comhttp://www.osvdb.org/74210
secalert@redhat.comhttp://www.securityfocus.com/bid/48979
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/68987
af854a3a-2127-422b-91ae-364da2661108http://jira.atheme.org/browse/AUDPLUG-394
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
af854a3a-2127-422b-91ae-364da2661108http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2011-1264.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45131Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45658Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45742Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45901Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46032Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46043Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46793Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48058Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48434Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48439Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1255-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2415
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/10/4
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/12/4
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/74210
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48979
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/68987

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "480F3134-72C6-49E1-A424-70712715E0B9",
              "versionEndIncluding": "0.8.8.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD56CB5-038F-45A9-AE9B-489186624232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E92586-2A99-45B5-8A78-5E35F1CF4FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6BFC6E-7932-49F7-A917-34B53474A4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5406CCC-DD17-402A-996C-A1CCA558F27B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "854AB57C-5B41-4B35-92B8-38E233F5991B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Off-by-one error in the CSoundFile::ReadAMS2 function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of instruments."
    },
    {
      "lang": "es",
      "value": "Error de superaci\u00f3n de l\u00edmite (off-by-one) en la funci\u00f3n CSoundFile::ReadAMS2 en src/load_ams.cpp en libmodplug antes de v0.8.8.4 permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo AMS dise\u00f1ado con una gran n\u00famero de instrumentos."
    }
  ],
  "id": "CVE-2011-2915",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-06-07T19:55:04.633",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/74210"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68987"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/74210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68987"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-2912

Vulnerability from fkie_nvd - Published: 2012-06-07 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
References
secalert@redhat.comhttp://jira.atheme.org/browse/AUDPLUG-394
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
secalert@redhat.comhttp://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2011-1264.html
secalert@redhat.comhttp://secunia.com/advisories/45131Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45658Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45742Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45901Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46032Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46043Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/46793Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48058Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48434Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48439Vendor Advisory
secalert@redhat.comhttp://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
secalert@redhat.comhttp://ubuntu.com/usn/usn-1255-1
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2415
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/10/4
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/12/4
secalert@redhat.comhttp://www.osvdb.org/74209
secalert@redhat.comhttp://www.securityfocus.com/bid/48979
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/68984
af854a3a-2127-422b-91ae-364da2661108http://jira.atheme.org/browse/AUDPLUG-394
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
af854a3a-2127-422b-91ae-364da2661108http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2011-1264.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45131Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45658Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45742Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45901Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46032Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46043Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46793Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48058Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48434Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48439Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1255-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2415
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/10/4
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/12/4
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/74209
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48979
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/68984

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "480F3134-72C6-49E1-A424-70712715E0B9",
              "versionEndIncluding": "0.8.8.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD56CB5-038F-45A9-AE9B-489186624232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E92586-2A99-45B5-8A78-5E35F1CF4FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6BFC6E-7932-49F7-A917-34B53474A4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5406CCC-DD17-402A-996C-A1CCA558F27B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "854AB57C-5B41-4B35-92B8-38E233F5991B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer basado en pila en la funci\u00f3n CSoundFile::ReadS3M en src/load_s3m.cpp en libmodplug antes de v0.8.8.4 permite a atacantes remotos causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo S3M dise\u00f1ado con un desplazamiento (offset) inv\u00e1lido."
    }
  ],
  "id": "CVE-2011-2912",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-06-07T19:55:04.367",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/74209"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68984"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jira.atheme.org/browse/AUDPLUG-394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45131"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45901"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/46793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1255-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/74209"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48979"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68984"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1761

Vulnerability from fkie_nvd - Published: 2012-06-07 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
secalert@redhat.comhttp://secunia.com/advisories/44388Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/44695Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/44870Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45742Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48058Vendor Advisory
secalert@redhat.comhttp://ubuntu.com/usn/usn-1148-1
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2415
secalert@redhat.comhttp://www.exploit-db.com/exploits/17222
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/05/02/1
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/05/02/19
secalert@redhat.comhttp://www.osvdb.org/72157
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44388Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44695Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44870Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45742Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48058Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1148-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2415
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/17222
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/05/02/1
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/05/02/19
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/72157

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7C9ADA-9E27-40C0-BA5C-3BDED9C22F60",
              "versionEndIncluding": "0.8.8.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD56CB5-038F-45A9-AE9B-489186624232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E92586-2A99-45B5-8A78-5E35F1CF4FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6BFC6E-7932-49F7-A917-34B53474A4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5406CCC-DD17-402A-996C-A1CCA558F27B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basados ??en pila en las funciones (1) abc_new_macro y (2) abc_new_umacro en src/load_abc.cpp en libmodplug antes de v0.8.8.3 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo ABC espec\u00edficamente elaborado para este fin. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2011-1761",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-06-07T19:55:02.883",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44388"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44695"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44870"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-1148-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.exploit-db.com/exploits/17222"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/05/02/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/05/02/19"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/72157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44388"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/44870"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-1148-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.exploit-db.com/exploits/17222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/05/02/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/05/02/19"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/72157"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1574

Vulnerability from fkie_nvd - Published: 2011-05-09 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091Patch
secalert@redhat.comhttp://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/04/11/13Exploit, Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/04/11/6Exploit, Patch
secalert@redhat.comhttp://secunia.com/advisories/44870
secalert@redhat.comhttp://secunia.com/advisories/48434
secalert@redhat.comhttp://securityreason.com/securityalert/8243
secalert@redhat.comhttp://securitytracker.com/id?1025480
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2226
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:085
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=695420Exploit, Patch
secalert@redhat.comhttps://rhn.redhat.com/errata/RHSA-2011-0477.html
secalert@redhat.comhttps://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txtExploit
secalert@redhat.comhttps://www.ubuntu.com/usn/USN-1148-1/
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091Patch
af854a3a-2127-422b-91ae-364da2661108http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/04/11/13Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/04/11/6Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44870
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48434
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/8243
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1025480
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2226
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:085
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=695420Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2011-0477.html
af854a3a-2127-422b-91ae-364da2661108https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txtExploit
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/USN-1148-1/

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BE5F4CD-6A11-4AF7-B774-4BE150C1F913",
              "versionEndIncluding": "0.8.8.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD56CB5-038F-45A9-AE9B-489186624232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E92586-2A99-45B5-8A78-5E35F1CF4FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F6BFC6E-7932-49F7-A917-34B53474A4BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en M\u00e9todo ReadS3M en load_s3m.cpp de libmodplug con anterioridad a v0.8.8.2, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero S3M manipulado.\r\n"
    }
  ],
  "id": "CVE-2011-1574",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-05-09T22:55:01.990",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/11/13"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/11/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/44870"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securityreason.com/securityalert/8243"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1025480"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2226"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:085"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695420"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.ubuntu.com/usn/USN-1148-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/11/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/04/11/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44870"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8243"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1025480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:085"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695420"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.ubuntu.com/usn/USN-1148-1/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-1513

Vulnerability from fkie_nvd - Published: 2009-05-04 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084
cve@mitre.orghttp://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3&r2=1.4
cve@mitre.orghttp://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595
cve@mitre.orghttp://osvdb.org/54109
cve@mitre.orghttp://secunia.com/advisories/34927Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/35026
cve@mitre.orghttp://secunia.com/advisories/35736
cve@mitre.orghttp://secunia.com/advisories/36158
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200907-07.xml
cve@mitre.orghttp://sourceforge.net/project/shownotes.php?release_id=678622&group_id=1275Patch
cve@mitre.orghttp://sourceforge.net/tracker/?func=detail&aid=2777467&group_id=1275&atid=301275Patch
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1850
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:128
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2009/04/29/5
cve@mitre.orghttp://www.securityfocus.com/bid/34747Patch
cve@mitre.orghttp://www.ubuntu.com/usn/USN-771-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1200Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084
af854a3a-2127-422b-91ae-364da2661108http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3&r2=1.4
af854a3a-2127-422b-91ae-364da2661108http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/54109
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34927Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35026
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35736
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36158
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200907-07.xml
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=678622&group_id=1275Patch
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/tracker/?func=detail&aid=2777467&group_id=1275&atid=301275Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1850
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:128
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/04/29/5
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34747Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-771-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1200Patch, Vendor Advisory

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0CAE8E-3B2A-4630-868C-79071A5A0450",
              "versionEndIncluding": "0.8.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E90B264-B800-4D01-B9C6-1B1A97702F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7869CDE5-B184-42EB-B0D6-6E6164AA324A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA5392B-E9CE-4092-BF72-5A661F1C20F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la funci\u00f3n PATinst en src/load_pat.cpp en libmodplug anteriores a v0.8.7 permite a atacantes remotos asistidos por usuarios, provocar una denegaci\u00f3n de servicio y posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n mediante un nombre de instrumento largo."
    }
  ],
  "id": "CVE-2009-1513",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-05-04T16:30:00.187",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/54109"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34927"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35026"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35736"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/36158"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1850"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34747"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-771-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1200"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/54109"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34927"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35026"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36158"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1850"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/34747"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-771-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1200"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of libmodplug embedded in gstreamer-plugins as shipped with Red Hat Enterprise Linux 3 and 4, as they do not include support for the PAT file type.",
      "lastModified": "2009-05-12T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2013-4234 (GCVE-0-2013-4234)

Vulnerability from cvelistv5 – Published: 2013-09-16 19:00 – Updated: 2024-08-06 16:38
VLAI?
Summary
Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2013/dsa-2751 vendor-advisoryx_refsource_DEBIAN
http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-se… x_refsource_MISC
http://secunia.com/advisories/54388 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2013/08/10/3 mailing-listx_refsource_MLIST
http://www.securityfocus.com/bid/61714 vdb-entryx_refsource_BID
http://secunia.com/advisories/54695 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:38:01.767Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2751",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2751"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
          },
          {
            "name": "54388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54388"
          },
          {
            "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
          },
          {
            "name": "61714",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/61714"
          },
          {
            "name": "54695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54695"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-07-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2751",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2751"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
        },
        {
          "name": "54388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54388"
        },
        {
          "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
        },
        {
          "name": "61714",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/61714"
        },
        {
          "name": "54695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54695"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4234",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2751",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2751"
            },
            {
              "name": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/",
              "refsource": "MISC",
              "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
            },
            {
              "name": "54388",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54388"
            },
            {
              "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
            },
            {
              "name": "61714",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/61714"
            },
            {
              "name": "54695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54695"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4234",
    "datePublished": "2013-09-16T19:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:38:01.767Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4233 (GCVE-0-2013-4233)

Vulnerability from cvelistv5 – Published: 2013-09-16 19:00 – Updated: 2024-09-17 00:16
VLAI?
Summary
Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2013/dsa-2751 vendor-advisoryx_refsource_DEBIAN
http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-se… x_refsource_MISC
http://secunia.com/advisories/54388 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2013/08/10/3 mailing-listx_refsource_MLIST
http://secunia.com/advisories/54695 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:38:01.693Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2751",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2751"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
          },
          {
            "name": "54388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54388"
          },
          {
            "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
          },
          {
            "name": "54695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54695"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-09-16T19:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2751",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2751"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
        },
        {
          "name": "54388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54388"
        },
        {
          "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
        },
        {
          "name": "54695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54695"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4233",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2751",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2751"
            },
            {
              "name": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/",
              "refsource": "MISC",
              "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
            },
            {
              "name": "54388",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54388"
            },
            {
              "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
            },
            {
              "name": "54695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54695"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4233",
    "datePublished": "2013-09-16T19:00:00Z",
    "dateReserved": "2013-06-12T00:00:00Z",
    "dateUpdated": "2024-09-17T00:16:36.871Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2915 (GCVE-0-2011-2915)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Off-by-one error in the CSoundFile::ReadAMS2 function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of instruments.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://www.osvdb.org/74210 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "libmodplug-csoundfile-code-exec(68987)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68987"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "74210",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74210"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the CSoundFile::ReadAMS2 function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of instruments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "libmodplug-csoundfile-code-exec(68987)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68987"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "74210",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74210"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2915",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1761 (GCVE-0-2011-1761)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 22:37
VLAI?
Summary
Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/44870 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/72157 vdb-entryx_refsource_OSVDB
http://ubuntu.com/usn/usn-1148-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/44695 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://www.exploit-db.com/exploits/17222 exploitx_refsource_EXPLOIT-DB
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
http://www.openwall.com/lists/oss-security/2011/05/02/1 mailing-listx_refsource_MLIST
http://secunia.com/advisories/44388 third-party-advisoryx_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_SUSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.759Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "name": "44870",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44870"
          },
          {
            "name": "72157",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/72157"
          },
          {
            "name": "USN-1148-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1148-1"
          },
          {
            "name": "44695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44695"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "17222",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/17222"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "[oss-security] 20120502 Re: CVE request: libmodplugin stack-buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/05/02/19"
          },
          {
            "name": "[oss-security] 20120502 CVE request: libmodplugin stack-buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/05/02/1"
          },
          {
            "name": "44388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44388"
          },
          {
            "name": "openSUSE-SU-2011:0551",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-06-07T19:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "name": "44870",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44870"
        },
        {
          "name": "72157",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/72157"
        },
        {
          "name": "USN-1148-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1148-1"
        },
        {
          "name": "44695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44695"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "17222",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/17222"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "[oss-security] 20120502 Re: CVE request: libmodplugin stack-buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/05/02/19"
        },
        {
          "name": "[oss-security] 20120502 CVE request: libmodplugin stack-buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/05/02/1"
        },
        {
          "name": "44388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44388"
        },
        {
          "name": "openSUSE-SU-2011:0551",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1761",
    "datePublished": "2012-06-07T19:00:00Z",
    "dateReserved": "2011-04-19T00:00:00Z",
    "dateUpdated": "2024-08-06T22:37:25.759Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2912 (GCVE-0-2011-2912)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://www.osvdb.org/74209 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.904Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "libmodplug-s3m-bo(68984)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68984"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "74209",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74209"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "libmodplug-s3m-bo(68984)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68984"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "74209",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74209"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2912",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.904Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2911 (GCVE-0-2011-2911)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/74208 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.663Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "74208",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74208"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "name": "libmodplug-wav-bo(68983)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68983"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "74208",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74208"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "name": "libmodplug-wav-bo(68983)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68983"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2911",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2914 (GCVE-0-2011-2914)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://www.osvdb.org/74211 vdb-entryx_refsource_OSVDB
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.776Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "74211",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74211"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "libmodplug-dsm-code-execution(68986)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "74211",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74211"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "libmodplug-dsm-code-execution(68986)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2914",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2913 (GCVE-0-2011-2913)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://www.osvdb.org/74210 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "libmodplug-ams-code-execution(68985)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "74210",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74210"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "libmodplug-ams-code-execution(68985)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "74210",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74210"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2913",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1574 (GCVE-0-2011-1574)

Vulnerability from cvelistv5 – Published: 2011-05-09 22:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.ubuntu.com/usn/USN-1148-1/ vendor-advisoryx_refsource_UBUNTU
http://openwall.com/lists/oss-security/2011/04/11/13 mailing-listx_refsource_MLIST
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091 x_refsource_CONFIRM
https://www.sec-consult.com/files/20110407-0_libm… x_refsource_MISC
http://secunia.com/advisories/44870 third-party-advisoryx_refsource_SECUNIA
http://openwall.com/lists/oss-security/2011/04/11/6 mailing-listx_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=695420 x_refsource_CONFIRM
http://securitytracker.com/id?1025480 vdb-entryx_refsource_SECTRACK
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2226 vendor-advisoryx_refsource_DEBIAN
http://securityreason.com/securityalert/8243 third-party-advisoryx_refsource_SREASON
https://rhn.redhat.com/errata/RHSA-2011-0477.html vendor-advisoryx_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.982Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1148-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://www.ubuntu.com/usn/USN-1148-1/"
          },
          {
            "name": "[oss-security] 20110411 Re: CVE request for libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/04/11/13"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt"
          },
          {
            "name": "44870",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44870"
          },
          {
            "name": "[oss-security] 20110411 CVE request for libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/04/11/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695420"
          },
          {
            "name": "1025480",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1025480"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "DSA-2226",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2226"
          },
          {
            "name": "8243",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8243"
          },
          {
            "name": "RHSA-2011:0477",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
          },
          {
            "name": "MDVSA-2011:085",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:085"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-06T21:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-1148-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://www.ubuntu.com/usn/USN-1148-1/"
        },
        {
          "name": "[oss-security] 20110411 Re: CVE request for libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/04/11/13"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt"
        },
        {
          "name": "44870",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44870"
        },
        {
          "name": "[oss-security] 20110411 CVE request for libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/04/11/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695420"
        },
        {
          "name": "1025480",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1025480"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "DSA-2226",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2226"
        },
        {
          "name": "8243",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8243"
        },
        {
          "name": "RHSA-2011:0477",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
        },
        {
          "name": "MDVSA-2011:085",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:085"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1574",
    "datePublished": "2011-05-09T22:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.982Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1513 (GCVE-0-2009-1513)

Vulnerability from cvelistv5 – Published: 2009-05-04 16:12 – Updated: 2024-08-07 05:13
VLAI?
Summary
Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.ubuntu.com/usn/USN-771-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/35736 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/34927 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1850 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/bid/34747 vdb-entryx_refsource_BID
http://modplug-xmms.cvs.sourceforge.net/viewvc/mo… x_refsource_CONFIRM
http://secunia.com/advisories/36158 third-party-advisoryx_refsource_SECUNIA
http://sourceforge.net/tracker/?func=detail&aid=2… x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://osvdb.org/54109 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/35026 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2009/04/29/5 mailing-listx_refsource_MLIST
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200907-07.xml vendor-advisoryx_refsource_GENTOO
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://sourceforge.net/project/shownotes.php?rele… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/1200 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.667Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-771-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-771-1"
          },
          {
            "name": "35736",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35736"
          },
          {
            "name": "34927",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34927"
          },
          {
            "name": "DSA-1850",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1850"
          },
          {
            "name": "34747",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34747"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
          },
          {
            "name": "36158",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36158"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
          },
          {
            "name": "MDVSA-2009:128",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
          },
          {
            "name": "54109",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54109"
          },
          {
            "name": "35026",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35026"
          },
          {
            "name": "[oss-security] 20090429 Re: CVE Request -- libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
          },
          {
            "name": "GLSA-200907-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
          },
          {
            "name": "ADV-2009-1200",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1200"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-05-13T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-771-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-771-1"
        },
        {
          "name": "35736",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35736"
        },
        {
          "name": "34927",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34927"
        },
        {
          "name": "DSA-1850",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1850"
        },
        {
          "name": "34747",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34747"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
        },
        {
          "name": "36158",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36158"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
        },
        {
          "name": "MDVSA-2009:128",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
        },
        {
          "name": "54109",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54109"
        },
        {
          "name": "35026",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35026"
        },
        {
          "name": "[oss-security] 20090429 Re: CVE Request -- libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
        },
        {
          "name": "GLSA-200907-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
        },
        {
          "name": "ADV-2009-1200",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1200"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1513",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-771-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-771-1"
            },
            {
              "name": "35736",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35736"
            },
            {
              "name": "34927",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34927"
            },
            {
              "name": "DSA-1850",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1850"
            },
            {
              "name": "34747",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34747"
            },
            {
              "name": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4",
              "refsource": "CONFIRM",
              "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
            },
            {
              "name": "36158",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36158"
            },
            {
              "name": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
            },
            {
              "name": "MDVSA-2009:128",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
            },
            {
              "name": "54109",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54109"
            },
            {
              "name": "35026",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35026"
            },
            {
              "name": "[oss-security] 20090429 Re: CVE Request -- libmodplug",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
            },
            {
              "name": "GLSA-200907-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
            },
            {
              "name": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms;a=commitdiff;h=c4ebb701be6ee9a296a44fdac5a20b7739ff0595",
              "refsource": "CONFIRM",
              "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms;a=commitdiff;h=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
            },
            {
              "name": "ADV-2009-1200",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1200"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1513",
    "datePublished": "2009-05-04T16:12:00",
    "dateReserved": "2009-05-04T00:00:00",
    "dateUpdated": "2024-08-07T05:13:25.667Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4234 (GCVE-0-2013-4234)

Vulnerability from nvd – Published: 2013-09-16 19:00 – Updated: 2024-08-06 16:38
VLAI?
Summary
Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2013/dsa-2751 vendor-advisoryx_refsource_DEBIAN
http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-se… x_refsource_MISC
http://secunia.com/advisories/54388 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2013/08/10/3 mailing-listx_refsource_MLIST
http://www.securityfocus.com/bid/61714 vdb-entryx_refsource_BID
http://secunia.com/advisories/54695 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:38:01.767Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2751",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2751"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
          },
          {
            "name": "54388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54388"
          },
          {
            "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
          },
          {
            "name": "61714",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/61714"
          },
          {
            "name": "54695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54695"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-07-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2751",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2751"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
        },
        {
          "name": "54388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54388"
        },
        {
          "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
        },
        {
          "name": "61714",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/61714"
        },
        {
          "name": "54695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54695"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4234",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2751",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2751"
            },
            {
              "name": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/",
              "refsource": "MISC",
              "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
            },
            {
              "name": "54388",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54388"
            },
            {
              "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
            },
            {
              "name": "61714",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/61714"
            },
            {
              "name": "54695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54695"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4234",
    "datePublished": "2013-09-16T19:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:38:01.767Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4233 (GCVE-0-2013-4233)

Vulnerability from nvd – Published: 2013-09-16 19:00 – Updated: 2024-09-17 00:16
VLAI?
Summary
Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2013/dsa-2751 vendor-advisoryx_refsource_DEBIAN
http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-se… x_refsource_MISC
http://secunia.com/advisories/54388 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2013/08/10/3 mailing-listx_refsource_MLIST
http://secunia.com/advisories/54695 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:38:01.693Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2751",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2751"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
          },
          {
            "name": "54388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54388"
          },
          {
            "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
          },
          {
            "name": "54695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54695"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-09-16T19:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2751",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2751"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
        },
        {
          "name": "54388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54388"
        },
        {
          "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
        },
        {
          "name": "54695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54695"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4233",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2751",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2751"
            },
            {
              "name": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/",
              "refsource": "MISC",
              "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
            },
            {
              "name": "54388",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54388"
            },
            {
              "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
            },
            {
              "name": "54695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54695"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4233",
    "datePublished": "2013-09-16T19:00:00Z",
    "dateReserved": "2013-06-12T00:00:00Z",
    "dateUpdated": "2024-09-17T00:16:36.871Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2915 (GCVE-0-2011-2915)

Vulnerability from nvd – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Off-by-one error in the CSoundFile::ReadAMS2 function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of instruments.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://www.osvdb.org/74210 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "libmodplug-csoundfile-code-exec(68987)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68987"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "74210",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74210"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the CSoundFile::ReadAMS2 function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of instruments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "libmodplug-csoundfile-code-exec(68987)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68987"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "74210",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74210"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2915",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1761 (GCVE-0-2011-1761)

Vulnerability from nvd – Published: 2012-06-07 19:00 – Updated: 2024-08-06 22:37
VLAI?
Summary
Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/44870 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/72157 vdb-entryx_refsource_OSVDB
http://ubuntu.com/usn/usn-1148-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/44695 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://www.exploit-db.com/exploits/17222 exploitx_refsource_EXPLOIT-DB
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
http://www.openwall.com/lists/oss-security/2011/05/02/1 mailing-listx_refsource_MLIST
http://secunia.com/advisories/44388 third-party-advisoryx_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_SUSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.759Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "name": "44870",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44870"
          },
          {
            "name": "72157",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/72157"
          },
          {
            "name": "USN-1148-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1148-1"
          },
          {
            "name": "44695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44695"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "17222",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/17222"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "[oss-security] 20120502 Re: CVE request: libmodplugin stack-buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/05/02/19"
          },
          {
            "name": "[oss-security] 20120502 CVE request: libmodplugin stack-buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/05/02/1"
          },
          {
            "name": "44388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44388"
          },
          {
            "name": "openSUSE-SU-2011:0551",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-06-07T19:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "name": "44870",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44870"
        },
        {
          "name": "72157",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/72157"
        },
        {
          "name": "USN-1148-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1148-1"
        },
        {
          "name": "44695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44695"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "17222",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/17222"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "[oss-security] 20120502 Re: CVE request: libmodplugin stack-buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/05/02/19"
        },
        {
          "name": "[oss-security] 20120502 CVE request: libmodplugin stack-buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/05/02/1"
        },
        {
          "name": "44388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44388"
        },
        {
          "name": "openSUSE-SU-2011:0551",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1761",
    "datePublished": "2012-06-07T19:00:00Z",
    "dateReserved": "2011-04-19T00:00:00Z",
    "dateUpdated": "2024-08-06T22:37:25.759Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2912 (GCVE-0-2011-2912)

Vulnerability from nvd – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://www.osvdb.org/74209 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.904Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "libmodplug-s3m-bo(68984)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68984"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "74209",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74209"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "libmodplug-s3m-bo(68984)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68984"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "74209",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74209"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2912",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.904Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2911 (GCVE-0-2011-2911)

Vulnerability from nvd – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/74208 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.663Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "74208",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74208"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "name": "libmodplug-wav-bo(68983)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68983"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "74208",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74208"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "name": "libmodplug-wav-bo(68983)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68983"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2911",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2914 (GCVE-0-2011-2914)

Vulnerability from nvd – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://www.osvdb.org/74211 vdb-entryx_refsource_OSVDB
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.776Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "74211",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74211"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "libmodplug-dsm-code-execution(68986)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "74211",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74211"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "libmodplug-dsm-code-execution(68986)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2914",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2913 (GCVE-0-2011-2913)

Vulnerability from nvd – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://www.osvdb.org/74210 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "libmodplug-ams-code-execution(68985)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "74210",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74210"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "libmodplug-ams-code-execution(68985)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "74210",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74210"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2913",
    "datePublished": "2012-06-07T19:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1574 (GCVE-0-2011-1574)

Vulnerability from nvd – Published: 2011-05-09 22:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.ubuntu.com/usn/USN-1148-1/ vendor-advisoryx_refsource_UBUNTU
http://openwall.com/lists/oss-security/2011/04/11/13 mailing-listx_refsource_MLIST
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091 x_refsource_CONFIRM
https://www.sec-consult.com/files/20110407-0_libm… x_refsource_MISC
http://secunia.com/advisories/44870 third-party-advisoryx_refsource_SECUNIA
http://openwall.com/lists/oss-security/2011/04/11/6 mailing-listx_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=695420 x_refsource_CONFIRM
http://securitytracker.com/id?1025480 vdb-entryx_refsource_SECTRACK
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2226 vendor-advisoryx_refsource_DEBIAN
http://securityreason.com/securityalert/8243 third-party-advisoryx_refsource_SREASON
https://rhn.redhat.com/errata/RHSA-2011-0477.html vendor-advisoryx_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.982Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1148-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://www.ubuntu.com/usn/USN-1148-1/"
          },
          {
            "name": "[oss-security] 20110411 Re: CVE request for libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/04/11/13"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt"
          },
          {
            "name": "44870",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44870"
          },
          {
            "name": "[oss-security] 20110411 CVE request for libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/04/11/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695420"
          },
          {
            "name": "1025480",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1025480"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "DSA-2226",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2226"
          },
          {
            "name": "8243",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8243"
          },
          {
            "name": "RHSA-2011:0477",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
          },
          {
            "name": "MDVSA-2011:085",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:085"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-06T21:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-1148-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://www.ubuntu.com/usn/USN-1148-1/"
        },
        {
          "name": "[oss-security] 20110411 Re: CVE request for libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/04/11/13"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt"
        },
        {
          "name": "44870",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44870"
        },
        {
          "name": "[oss-security] 20110411 CVE request for libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/04/11/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695420"
        },
        {
          "name": "1025480",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1025480"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "DSA-2226",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2226"
        },
        {
          "name": "8243",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8243"
        },
        {
          "name": "RHSA-2011:0477",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
        },
        {
          "name": "MDVSA-2011:085",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:085"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1574",
    "datePublished": "2011-05-09T22:00:00",
    "dateReserved": "2011-04-05T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.982Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1513 (GCVE-0-2009-1513)

Vulnerability from nvd – Published: 2009-05-04 16:12 – Updated: 2024-08-07 05:13
VLAI?
Summary
Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.ubuntu.com/usn/USN-771-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/35736 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/34927 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1850 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/bid/34747 vdb-entryx_refsource_BID
http://modplug-xmms.cvs.sourceforge.net/viewvc/mo… x_refsource_CONFIRM
http://secunia.com/advisories/36158 third-party-advisoryx_refsource_SECUNIA
http://sourceforge.net/tracker/?func=detail&aid=2… x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://osvdb.org/54109 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/35026 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2009/04/29/5 mailing-listx_refsource_MLIST
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200907-07.xml vendor-advisoryx_refsource_GENTOO
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://sourceforge.net/project/shownotes.php?rele… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/1200 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.667Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-771-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-771-1"
          },
          {
            "name": "35736",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35736"
          },
          {
            "name": "34927",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34927"
          },
          {
            "name": "DSA-1850",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1850"
          },
          {
            "name": "34747",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34747"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
          },
          {
            "name": "36158",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36158"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
          },
          {
            "name": "MDVSA-2009:128",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
          },
          {
            "name": "54109",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54109"
          },
          {
            "name": "35026",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35026"
          },
          {
            "name": "[oss-security] 20090429 Re: CVE Request -- libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
          },
          {
            "name": "GLSA-200907-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
          },
          {
            "name": "ADV-2009-1200",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1200"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-05-13T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-771-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-771-1"
        },
        {
          "name": "35736",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35736"
        },
        {
          "name": "34927",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34927"
        },
        {
          "name": "DSA-1850",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1850"
        },
        {
          "name": "34747",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34747"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
        },
        {
          "name": "36158",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36158"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
        },
        {
          "name": "MDVSA-2009:128",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
        },
        {
          "name": "54109",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54109"
        },
        {
          "name": "35026",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35026"
        },
        {
          "name": "[oss-security] 20090429 Re: CVE Request -- libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
        },
        {
          "name": "GLSA-200907-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
        },
        {
          "name": "ADV-2009-1200",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1200"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1513",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-771-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-771-1"
            },
            {
              "name": "35736",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35736"
            },
            {
              "name": "34927",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34927"
            },
            {
              "name": "DSA-1850",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1850"
            },
            {
              "name": "34747",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34747"
            },
            {
              "name": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4",
              "refsource": "CONFIRM",
              "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
            },
            {
              "name": "36158",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36158"
            },
            {
              "name": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
            },
            {
              "name": "MDVSA-2009:128",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
            },
            {
              "name": "54109",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54109"
            },
            {
              "name": "35026",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35026"
            },
            {
              "name": "[oss-security] 20090429 Re: CVE Request -- libmodplug",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
            },
            {
              "name": "GLSA-200907-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
            },
            {
              "name": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms;a=commitdiff;h=c4ebb701be6ee9a296a44fdac5a20b7739ff0595",
              "refsource": "CONFIRM",
              "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms;a=commitdiff;h=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
            },
            {
              "name": "ADV-2009-1200",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1200"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1513",
    "datePublished": "2009-05-04T16:12:00",
    "dateReserved": "2009-05-04T00:00:00",
    "dateUpdated": "2024-08-07T05:13:25.667Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}