CVE-2009-1438

Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
VendorProductVersion
konstanty_bialkowskilibmodplug
𝑥
≤ 0.8.5
konstanty_bialkowskilibmodplug
0.8
konstanty_bialkowskilibmodplug
0.8.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libmodplug
sid
1:0.8.9.0-3
fixed
trixie
1:0.8.9.0-3
fixed
bookworm
1:0.8.9.0-3
fixed
bullseye
1:0.8.9.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gst-plugins-bad0.10
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
not-affected
karmic
not-affected
jaunty
not-affected
intrepid
ignored
hardy
ignored
dapper
ignored
libmodplug
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
not-affected
karmic
not-affected
jaunty
Fixed 1:0.8.4-3ubuntu1.1
released
intrepid
Fixed 1:0.7-7ubuntu0.8.10.1
released
hardy
Fixed 1:0.7-7ubuntu0.8.04.1
released
dapper
Fixed 1:0.7-5ubuntu0.6.06.2
released
Common Weakness Enumeration
References