Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | libmodplug | < 1:0.8.8.2-1 | libmodplug_1:0.8.8.2-1_all.deb |
Debian | 11 | all | libmodplug | < 1:0.8.8.2-1 | libmodplug_1:0.8.8.2-1_all.deb |
Debian | 10 | all | libmodplug | < 1:0.8.8.2-1 | libmodplug_1:0.8.8.2-1_all.deb |
Debian | 999 | all | libmodplug | < 1:0.8.8.2-1 | libmodplug_1:0.8.8.2-1_all.deb |
Debian | 13 | all | libmodplug | < 1:0.8.8.2-1 | libmodplug_1:0.8.8.2-1_all.deb |