CVE-2011-1574

Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
konstanty_bialkowskilibmodplug
𝑥
≤ 0.8.8.1
konstanty_bialkowskilibmodplug
0.8
konstanty_bialkowskilibmodplug
0.8.4
konstanty_bialkowskilibmodplug
0.8.5
konstanty_bialkowskilibmodplug
0.8.6
konstanty_bialkowskilibmodplug
0.8.7
konstanty_bialkowskilibmodplug
0.8.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libmodplug
sid
1:0.8.9.0-3
fixed
trixie
1:0.8.9.0-3
fixed
bookworm
1:0.8.9.0-3
fixed
bullseye
1:0.8.9.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gst-plugins-bad0.10
natty
not-affected
maverick
not-affected
lucid
not-affected
hardy
ignored
dapper
ignored
libmodplug
natty
Fixed 1:0.8.8.1-2ubuntu0.2
released
maverick
Fixed 1:0.8.8.1-1ubuntu1.2
released
lucid
Fixed 1:0.8.7-1ubuntu0.2
released
hardy
ignored
dapper
ignored
References