Computer Security
[EN] securityvulns.ru no-pyccku


libmodplug library buffer overflow
Published:11.04.2011
Source:
SecurityVulns ID:11574
Type:library
Threat Level:
6/10
Description:ReadS3M buffer overflow. DoS on ABC files parsing.
Affected:LIBMODPLUG : libmodplug 0.8
CVE:CVE-2011-1761 (Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.)
 CVE-2011-1574 (Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.)
Original documentdocumentSEC Consult Vulnerability Lab, SEC Consult SA-20110407-0 :: Libmodplug ReadS3M Stack Overflow (11.04.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod