Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

11 vulnerabilities by konstanty_bialkowski

CVE-2013-4234 (GCVE-0-2013-4234)

Vulnerability from cvelistv5 – Published: 2013-09-16 19:00 – Updated: 2024-08-06 16:38
VLAI?
Summary
Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2013/dsa-2751 vendor-advisoryx_refsource_DEBIAN
http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-se… x_refsource_MISC
http://secunia.com/advisories/54388 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2013/08/10/3 mailing-listx_refsource_MLIST
http://www.securityfocus.com/bid/61714 vdb-entryx_refsource_BID
http://secunia.com/advisories/54695 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2013-07-24 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:38:01.767Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2751",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2751"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
          },
          {
            "name": "54388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54388"
          },
          {
            "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
          },
          {
            "name": "61714",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/61714"
          },
          {
            "name": "54695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54695"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-07-24T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-29T18:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2751",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2751"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
        },
        {
          "name": "54388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54388"
        },
        {
          "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
        },
        {
          "name": "61714",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/61714"
        },
        {
          "name": "54695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54695"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4234",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2751",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2751"
            },
            {
              "name": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/",
              "refsource": "MISC",
              "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
            },
            {
              "name": "54388",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54388"
            },
            {
              "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
            },
            {
              "name": "61714",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/61714"
            },
            {
              "name": "54695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54695"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4234",
    "datePublished": "2013-09-16T19:00:00.000Z",
    "dateReserved": "2013-06-12T00:00:00.000Z",
    "dateUpdated": "2024-08-06T16:38:01.767Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4233 (GCVE-0-2013-4233)

Vulnerability from cvelistv5 – Published: 2013-09-16 19:00 – Updated: 2024-09-17 00:16
VLAI?
Summary
Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2013/dsa-2751 vendor-advisoryx_refsource_DEBIAN
http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-se… x_refsource_MISC
http://secunia.com/advisories/54388 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2013/08/10/3 mailing-listx_refsource_MLIST
http://secunia.com/advisories/54695 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:38:01.693Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2751",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2751"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
          },
          {
            "name": "54388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54388"
          },
          {
            "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
          },
          {
            "name": "54695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/54695"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-09-16T19:00:00.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2751",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2751"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
        },
        {
          "name": "54388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54388"
        },
        {
          "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
        },
        {
          "name": "54695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/54695"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4233",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-2751",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2751"
            },
            {
              "name": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/",
              "refsource": "MISC",
              "url": "http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/"
            },
            {
              "name": "54388",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54388"
            },
            {
              "name": "[oss-security] 20130809 Re: CVE Request - LibModPlug \u003c=0.8.8.4 multiple heap  overflow",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/08/10/3"
            },
            {
              "name": "54695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/54695"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4233",
    "datePublished": "2013-09-16T19:00:00.000Z",
    "dateReserved": "2013-06-12T00:00:00.000Z",
    "dateUpdated": "2024-09-17T00:16:36.871Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2915 (GCVE-0-2011-2915)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Off-by-one error in the CSoundFile::ReadAMS2 function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of instruments.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://www.osvdb.org/74210 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2011-08-03 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "libmodplug-csoundfile-code-exec(68987)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68987"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "74210",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74210"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the CSoundFile::ReadAMS2 function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of instruments."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "libmodplug-csoundfile-code-exec(68987)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68987"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=16d7a78efe14d345a6c5b241f88422ad0ee483ea"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "74210",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74210"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2915",
    "datePublished": "2012-06-07T19:00:00.000Z",
    "dateReserved": "2011-07-27T00:00:00.000Z",
    "dateUpdated": "2024-08-06T23:15:31.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2914 (GCVE-0-2011-2914)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://www.osvdb.org/74211 vdb-entryx_refsource_OSVDB
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2011-08-03 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.776Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "74211",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74211"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "libmodplug-dsm-code-execution(68986)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "74211",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74211"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "libmodplug-dsm-code-execution(68986)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2914",
    "datePublished": "2012-06-07T19:00:00.000Z",
    "dateReserved": "2011-07-27T00:00:00.000Z",
    "dateUpdated": "2024-08-06T23:15:31.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1761 (GCVE-0-2011-1761)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 22:37
VLAI?
Summary
Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/44870 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/72157 vdb-entryx_refsource_OSVDB
http://ubuntu.com/usn/usn-1148-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/44695 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://www.exploit-db.com/exploits/17222 exploitx_refsource_EXPLOIT-DB
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.openwall.com/lists/oss-security/2011/0… mailing-listx_refsource_MLIST
http://www.openwall.com/lists/oss-security/2011/05/02/1 mailing-listx_refsource_MLIST
http://secunia.com/advisories/44388 third-party-advisoryx_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_SUSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.759Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "name": "44870",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44870"
          },
          {
            "name": "72157",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/72157"
          },
          {
            "name": "USN-1148-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1148-1"
          },
          {
            "name": "44695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44695"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "17222",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/17222"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "[oss-security] 20120502 Re: CVE request: libmodplugin stack-buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/05/02/19"
          },
          {
            "name": "[oss-security] 20120502 CVE request: libmodplugin stack-buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/05/02/1"
          },
          {
            "name": "44388",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44388"
          },
          {
            "name": "openSUSE-SU-2011:0551",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-06-07T19:00:00.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "name": "44870",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44870"
        },
        {
          "name": "72157",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/72157"
        },
        {
          "name": "USN-1148-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1148-1"
        },
        {
          "name": "44695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44695"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "17222",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/17222"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "[oss-security] 20120502 Re: CVE request: libmodplugin stack-buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/05/02/19"
        },
        {
          "name": "[oss-security] 20120502 CVE request: libmodplugin stack-buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/05/02/1"
        },
        {
          "name": "44388",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44388"
        },
        {
          "name": "openSUSE-SU-2011:0551",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1761",
    "datePublished": "2012-06-07T19:00:00.000Z",
    "dateReserved": "2011-04-19T00:00:00.000Z",
    "dateUpdated": "2024-08-06T22:37:25.759Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2912 (GCVE-0-2011-2912)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://www.osvdb.org/74209 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2011-08-03 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.904Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "libmodplug-s3m-bo(68984)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68984"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "74209",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74209"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "libmodplug-s3m-bo(68984)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68984"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "74209",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74209"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2912",
    "datePublished": "2012-06-07T19:00:00.000Z",
    "dateReserved": "2011-07-27T00:00:00.000Z",
    "dateUpdated": "2024-08-06T23:15:31.904Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2911 (GCVE-0-2011-2911)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/74208 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2011-08-03 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.663Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "74208",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74208"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "name": "libmodplug-wav-bo(68983)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68983"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "74208",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74208"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=2d4c56de314ab13e4437bd8b609f0b751066eee8"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "name": "libmodplug-wav-bo(68983)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68983"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2911",
    "datePublished": "2012-06-07T19:00:00.000Z",
    "dateReserved": "2011-07-27T00:00:00.000Z",
    "dateUpdated": "2024-08-06T23:15:31.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-2913 (GCVE-0-2011-2913)

Vulnerability from cvelistv5 – Published: 2012-06-07 19:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2011/08/10/4 mailing-listx_refsource_MLIST
http://www.debian.org/security/2012/dsa-2415 vendor-advisoryx_refsource_DEBIAN
http://sourceforge.net/projects/modplug-xmms/file… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/45131 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2011/08/12/4 mailing-listx_refsource_MLIST
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/48058 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46032 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/46793 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/48439 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/45742 third-party-advisoryx_refsource_SECUNIA
http://ubuntu.com/usn/usn-1255-1 vendor-advisoryx_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/48979 vdb-entryx_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/45901 third-party-advisoryx_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2011-1264.html vendor-advisoryx_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/46043 third-party-advisoryx_refsource_SECUNIA
http://jira.atheme.org/browse/AUDPLUG-394 x_refsource_CONFIRM
http://www.osvdb.org/74210 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/45658 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2011-08-03 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2011-12370",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
          },
          {
            "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
          },
          {
            "name": "DSA-2415",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "name": "FEDORA-2011-10503",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
          },
          {
            "name": "45131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45131"
          },
          {
            "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
          },
          {
            "name": "48058",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48058"
          },
          {
            "name": "46032",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46032"
          },
          {
            "name": "46793",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46793"
          },
          {
            "name": "48439",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48439"
          },
          {
            "name": "45742",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45742"
          },
          {
            "name": "USN-1255-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-1255-1"
          },
          {
            "name": "openSUSE-SU-2011:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "48979",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48979"
          },
          {
            "name": "GLSA-201203-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
          },
          {
            "name": "45901",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45901"
          },
          {
            "name": "RHSA-2011:1264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
          },
          {
            "name": "libmodplug-ams-code-execution(68985)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
          },
          {
            "name": "46043",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46043"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://jira.atheme.org/browse/AUDPLUG-394"
          },
          {
            "name": "74210",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/74210"
          },
          {
            "name": "45658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "FEDORA-2011-12370",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html"
        },
        {
          "name": "[oss-security] 20120810 CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/10/4"
        },
        {
          "name": "DSA-2415",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "name": "FEDORA-2011-10503",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html"
        },
        {
          "name": "45131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45131"
        },
        {
          "name": "[oss-security] 20120812 Re: CVE request: libmodplug: multiple  vulnerabilities reported in \u003c= 0.8.8.3",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/12/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=26243ab9fe1171f70053e9aec4b20e9f7de9e4ef"
        },
        {
          "name": "48058",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48058"
        },
        {
          "name": "46032",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46032"
        },
        {
          "name": "46793",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46793"
        },
        {
          "name": "48439",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48439"
        },
        {
          "name": "45742",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45742"
        },
        {
          "name": "USN-1255-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-1255-1"
        },
        {
          "name": "openSUSE-SU-2011:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "48979",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48979"
        },
        {
          "name": "GLSA-201203-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml"
        },
        {
          "name": "45901",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45901"
        },
        {
          "name": "RHSA-2011:1264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2011-1264.html"
        },
        {
          "name": "libmodplug-ams-code-execution(68985)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68985"
        },
        {
          "name": "46043",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46043"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://jira.atheme.org/browse/AUDPLUG-394"
        },
        {
          "name": "74210",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/74210"
        },
        {
          "name": "45658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2913",
    "datePublished": "2012-06-07T19:00:00.000Z",
    "dateReserved": "2011-07-27T00:00:00.000Z",
    "dateUpdated": "2024-08-06T23:15:31.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1574 (GCVE-0-2011-1574)

Vulnerability from cvelistv5 – Published: 2011-05-09 22:00 – Updated: 2024-08-06 22:28
VLAI?
Summary
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.ubuntu.com/usn/USN-1148-1/ vendor-advisoryx_refsource_UBUNTU
http://openwall.com/lists/oss-security/2011/04/11/13 mailing-listx_refsource_MLIST
http://www.gentoo.org/security/en/glsa/glsa-20120… vendor-advisoryx_refsource_GENTOO
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091 x_refsource_CONFIRM
https://www.sec-consult.com/files/20110407-0_libm… x_refsource_MISC
http://secunia.com/advisories/44870 third-party-advisoryx_refsource_SECUNIA
http://openwall.com/lists/oss-security/2011/04/11/6 mailing-listx_refsource_MLIST
https://bugzilla.redhat.com/show_bug.cgi?id=695420 x_refsource_CONFIRM
http://securitytracker.com/id?1025480 vdb-entryx_refsource_SECTRACK
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://secunia.com/advisories/48434 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2226 vendor-advisoryx_refsource_DEBIAN
http://securityreason.com/securityalert/8243 third-party-advisoryx_refsource_SREASON
https://rhn.redhat.com/errata/RHSA-2011-0477.html vendor-advisoryx_refsource_REDHAT
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
Date Public ?
2011-04-07 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.982Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-1148-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://www.ubuntu.com/usn/USN-1148-1/"
          },
          {
            "name": "[oss-security] 20110411 Re: CVE request for libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/04/11/13"
          },
          {
            "name": "GLSA-201203-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt"
          },
          {
            "name": "44870",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44870"
          },
          {
            "name": "[oss-security] 20110411 CVE request for libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/04/11/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695420"
          },
          {
            "name": "1025480",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1025480"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b"
          },
          {
            "name": "48434",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48434"
          },
          {
            "name": "DSA-2226",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2226"
          },
          {
            "name": "8243",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8243"
          },
          {
            "name": "RHSA-2011:0477",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
          },
          {
            "name": "MDVSA-2011:085",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:085"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-07T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-06T21:57:01.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "USN-1148-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://www.ubuntu.com/usn/USN-1148-1/"
        },
        {
          "name": "[oss-security] 20110411 Re: CVE request for libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/04/11/13"
        },
        {
          "name": "GLSA-201203-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt"
        },
        {
          "name": "44870",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44870"
        },
        {
          "name": "[oss-security] 20110411 CVE request for libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/04/11/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695420"
        },
        {
          "name": "1025480",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1025480"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b"
        },
        {
          "name": "48434",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48434"
        },
        {
          "name": "DSA-2226",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2226"
        },
        {
          "name": "8243",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8243"
        },
        {
          "name": "RHSA-2011:0477",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2011-0477.html"
        },
        {
          "name": "MDVSA-2011:085",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:085"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1574",
    "datePublished": "2011-05-09T22:00:00.000Z",
    "dateReserved": "2011-04-05T00:00:00.000Z",
    "dateUpdated": "2024-08-06T22:28:41.982Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1513 (GCVE-0-2009-1513)

Vulnerability from cvelistv5 – Published: 2009-05-04 16:12 – Updated: 2024-08-07 05:13
VLAI?
Summary
Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.ubuntu.com/usn/USN-771-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/35736 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/34927 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1850 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/bid/34747 vdb-entryx_refsource_BID
http://modplug-xmms.cvs.sourceforge.net/viewvc/mo… x_refsource_CONFIRM
http://secunia.com/advisories/36158 third-party-advisoryx_refsource_SECUNIA
http://sourceforge.net/tracker/?func=detail&aid=2… x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://osvdb.org/54109 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/35026 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2009/04/29/5 mailing-listx_refsource_MLIST
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084 x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200907-07.xml vendor-advisoryx_refsource_GENTOO
http://modplug-xmms.git.sourceforge.net/git/gitwe… x_refsource_CONFIRM
http://sourceforge.net/project/shownotes.php?rele… x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/1200 vdb-entryx_refsource_VUPEN
Date Public ?
2009-04-21 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.667Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "USN-771-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-771-1"
          },
          {
            "name": "35736",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35736"
          },
          {
            "name": "34927",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34927"
          },
          {
            "name": "DSA-1850",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1850"
          },
          {
            "name": "34747",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34747"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
          },
          {
            "name": "36158",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36158"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
          },
          {
            "name": "MDVSA-2009:128",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
          },
          {
            "name": "54109",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54109"
          },
          {
            "name": "35026",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35026"
          },
          {
            "name": "[oss-security] 20090429 Re: CVE Request -- libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
          },
          {
            "name": "GLSA-200907-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
          },
          {
            "name": "ADV-2009-1200",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1200"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-05-13T09:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "USN-771-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-771-1"
        },
        {
          "name": "35736",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35736"
        },
        {
          "name": "34927",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34927"
        },
        {
          "name": "DSA-1850",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1850"
        },
        {
          "name": "34747",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34747"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
        },
        {
          "name": "36158",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36158"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
        },
        {
          "name": "MDVSA-2009:128",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
        },
        {
          "name": "54109",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54109"
        },
        {
          "name": "35026",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35026"
        },
        {
          "name": "[oss-security] 20090429 Re: CVE Request -- libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
        },
        {
          "name": "GLSA-200907-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commitdiff%3Bh=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
        },
        {
          "name": "ADV-2009-1200",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1200"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1513",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "USN-771-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-771-1"
            },
            {
              "name": "35736",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35736"
            },
            {
              "name": "34927",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34927"
            },
            {
              "name": "DSA-1850",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1850"
            },
            {
              "name": "34747",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34747"
            },
            {
              "name": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4",
              "refsource": "CONFIRM",
              "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_pat.cpp?r1=1.3\u0026r2=1.4"
            },
            {
              "name": "36158",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36158"
            },
            {
              "name": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/tracker/?func=detail\u0026aid=2777467\u0026group_id=1275\u0026atid=301275"
            },
            {
              "name": "MDVSA-2009:128",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
            },
            {
              "name": "54109",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54109"
            },
            {
              "name": "35026",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35026"
            },
            {
              "name": "[oss-security] 20090429 Re: CVE Request -- libmodplug",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/04/29/5"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084"
            },
            {
              "name": "GLSA-200907-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
            },
            {
              "name": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms;a=commitdiff;h=c4ebb701be6ee9a296a44fdac5a20b7739ff0595",
              "refsource": "CONFIRM",
              "url": "http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms;a=commitdiff;h=c4ebb701be6ee9a296a44fdac5a20b7739ff0595"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=678622\u0026group_id=1275"
            },
            {
              "name": "ADV-2009-1200",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1200"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1513",
    "datePublished": "2009-05-04T16:12:00.000Z",
    "dateReserved": "2009-05-04T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:13:25.667Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1438 (GCVE-0-2009-1438)

Vulnerability from cvelistv5 – Published: 2009-04-27 17:43 – Updated: 2024-08-07 05:13
VLAI?
Summary
Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://osvdb.org/53801 vdb-entryx_refsource_OSVDB
http://www.ubuntu.com/usn/USN-771-1 vendor-advisoryx_refsource_UBUNTU
http://modplug-xmms.cvs.sourceforge.net/viewvc/mo… x_refsource_MISC
http://secunia.com/advisories/34797 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/35736 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/36183 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1850 vendor-advisoryx_refsource_DEBIAN
https://bugzilla.redhat.com/show_bug.cgi?id=496834 x_refsource_CONFIRM
http://www.debian.org/security/2009/dsa-1851 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/36158 third-party-advisoryx_refsource_SECUNIA
http://bugs.gentoo.org/show_bug.cgi?id=266913 x_refsource_CONFIRM
http://www.securityfocus.com/bid/30801 vdb-entryx_refsource_BID
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/35026 third-party-advisoryx_refsource_SECUNIA
http://sourceforge.net/project/shownotes.php?rele… x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200907-07.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/35685 third-party-advisoryx_refsource_SECUNIA
http://www.redhat.com/archives/fedora-package-ann… vendor-advisoryx_refsource_FEDORA
http://www.redhat.com/archives/fedora-package-ann… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2009/1104 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/34930 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://www.openwall.com/lists/oss-security/2009/04/21/4 mailing-listx_refsource_MLIST
Date Public ?
2009-04-20 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.509Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "53801",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/53801"
          },
          {
            "name": "USN-771-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-771-1"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1\u0026amp%3Br2=1.2"
          },
          {
            "name": "34797",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34797"
          },
          {
            "name": "35736",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35736"
          },
          {
            "name": "36183",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36183"
          },
          {
            "name": "DSA-1850",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1850"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496834"
          },
          {
            "name": "DSA-1851",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1851"
          },
          {
            "name": "36158",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36158"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=266913"
          },
          {
            "name": "30801",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30801"
          },
          {
            "name": "MDVSA-2009:128",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
          },
          {
            "name": "libmodplug-csoundfilereadmed-bo(50388)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50388"
          },
          {
            "name": "35026",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35026"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=677065\u0026group_id=1275"
          },
          {
            "name": "GLSA-200907-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
          },
          {
            "name": "35685",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35685"
          },
          {
            "name": "FEDORA-2009-4068",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00908.html"
          },
          {
            "name": "FEDORA-2009-4064",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00907.html"
          },
          {
            "name": "ADV-2009-1104",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1104"
          },
          {
            "name": "34930",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34930"
          },
          {
            "name": "SUSE-SR:2009:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
          },
          {
            "name": "[oss-security] 20090421 CVE Request -- libmodplug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/04/21/4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-20T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "53801",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/53801"
        },
        {
          "name": "USN-771-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-771-1"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1\u0026amp%3Br2=1.2"
        },
        {
          "name": "34797",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34797"
        },
        {
          "name": "35736",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35736"
        },
        {
          "name": "36183",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36183"
        },
        {
          "name": "DSA-1850",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1850"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496834"
        },
        {
          "name": "DSA-1851",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1851"
        },
        {
          "name": "36158",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36158"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=266913"
        },
        {
          "name": "30801",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30801"
        },
        {
          "name": "MDVSA-2009:128",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
        },
        {
          "name": "libmodplug-csoundfilereadmed-bo(50388)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50388"
        },
        {
          "name": "35026",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35026"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=677065\u0026group_id=1275"
        },
        {
          "name": "GLSA-200907-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
        },
        {
          "name": "35685",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35685"
        },
        {
          "name": "FEDORA-2009-4068",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00908.html"
        },
        {
          "name": "FEDORA-2009-4064",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00907.html"
        },
        {
          "name": "ADV-2009-1104",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1104"
        },
        {
          "name": "34930",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34930"
        },
        {
          "name": "SUSE-SR:2009:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
        },
        {
          "name": "[oss-security] 20090421 CVE Request -- libmodplug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/04/21/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1438",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "53801",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/53801"
            },
            {
              "name": "USN-771-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-771-1"
            },
            {
              "name": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1\u0026amp;r2=1.2",
              "refsource": "MISC",
              "url": "http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1\u0026amp;r2=1.2"
            },
            {
              "name": "34797",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34797"
            },
            {
              "name": "35736",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35736"
            },
            {
              "name": "36183",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36183"
            },
            {
              "name": "DSA-1850",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1850"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=496834",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496834"
            },
            {
              "name": "DSA-1851",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1851"
            },
            {
              "name": "36158",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36158"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=266913",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=266913"
            },
            {
              "name": "30801",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30801"
            },
            {
              "name": "MDVSA-2009:128",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:128"
            },
            {
              "name": "libmodplug-csoundfilereadmed-bo(50388)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50388"
            },
            {
              "name": "35026",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35026"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=677065\u0026group_id=1275",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=677065\u0026group_id=1275"
            },
            {
              "name": "GLSA-200907-07",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200907-07.xml"
            },
            {
              "name": "35685",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35685"
            },
            {
              "name": "FEDORA-2009-4068",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00908.html"
            },
            {
              "name": "FEDORA-2009-4064",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00907.html"
            },
            {
              "name": "ADV-2009-1104",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1104"
            },
            {
              "name": "34930",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34930"
            },
            {
              "name": "SUSE-SR:2009:012",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"
            },
            {
              "name": "[oss-security] 20090421 CVE Request -- libmodplug",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/04/21/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1438",
    "datePublished": "2009-04-27T17:43:00.000Z",
    "dateReserved": "2009-04-27T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:13:25.509Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}