CVE-2009-1438
27.04.2009, 18:00
Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.Enginsight
| Vendor | Product | Version |
|---|---|---|
| konstanty_bialkowski | libmodplug | 𝑥 ≤ 0.8.5 |
| konstanty_bialkowski | libmodplug | 0.8 |
| konstanty_bialkowski | libmodplug | 0.8.4 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| gst-plugins-bad0.10 |
| ||||||||||||||||||
| libmodplug |
|
Common Weakness Enumeration
References