blob: 7ce79080ba8371649a5f15f916403c484082697f [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200612-04">
<title>ModPlug: Multiple buffer overflows</title>
ModPlug contains several boundary errors that could lead to buffer
overflows resulting in the possible execution of arbitrary code.
<product type="ebuild">libmodplug</product>
<announced>December 10, 2006</announced>
<revised>December 10, 2006: 01</revised>
<package name="media-libs/libmodplug" auto="yes" arch="*">
<unaffected range="ge">0.8-r1</unaffected>
<vulnerable range="lt">0.8-r1</vulnerable>
ModPlug is a library for playing MOD-like music.
Luigi Auriemma has reported various boundary errors in load_it.cpp and
a boundary error in the "CSoundFile::ReadSample()" function in
<impact type="normal">
A remote attacker can entice a user to read crafted modules or ITP
files, which may trigger a buffer overflow resulting in the execution
of arbitrary code with the privileges of the user running the
There is no known workaround at this time.
All ModPlug users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-libs/libmodplug-0.8-r1&quot;</code>
<uri link="">CVE-2006-4192</uri>
<metadata tag="requester" timestamp="Tue, 05 Dec 2006 19:55:31 +0000">
<metadata tag="bugReady" timestamp="Thu, 07 Dec 2006 10:06:27 +0000">
<metadata tag="submitter" timestamp="Fri, 08 Dec 2006 13:57:46 +0000">