Computer Security
[EN] no-pyccku

libmodplug library buffer overflow
SecurityVulns ID:11574
Threat Level:
Description:ReadS3M buffer overflow. DoS on ABC files parsing.
Affected:LIBMODPLUG : libmodplug 0.8
CVE:CVE-2011-1761 (Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.)
 CVE-2011-1574 (Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before allows remote attackers to execute arbitrary code via a crafted S3M file.)
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20110407-0 :: Libmodplug ReadS3M Stack Overflow (11.04.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod