CVE-2009-1438
27.04.2009, 18:00
Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.Enginsight
Vendor | Product | Version |
---|---|---|
konstanty_bialkowski | libmodplug | 𝑥 ≤ 0.8.5 |
konstanty_bialkowski | libmodplug | 0.8 |
konstanty_bialkowski | libmodplug | 0.8.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
gst-plugins-bad0.10 |
| ||||||||||||||||||
libmodplug |
|
Common Weakness Enumeration
References