6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
AI Score
Confidence
Low
0.052 Low
EPSS
Percentile
93.0%
Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
jira.atheme.org/browse/AUDPLUG-394
lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commitdiff%3Bh=f4e5295658fff000379caa122e75c9200205fe20
rhn.redhat.com/errata/RHSA-2011-1264.html
secunia.com/advisories/45131
secunia.com/advisories/45658
secunia.com/advisories/45742
secunia.com/advisories/45901
secunia.com/advisories/46032
secunia.com/advisories/46043
secunia.com/advisories/46793
secunia.com/advisories/48058
secunia.com/advisories/48434
secunia.com/advisories/48439
sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
ubuntu.com/usn/usn-1255-1
www.debian.org/security/2012/dsa-2415
www.gentoo.org/security/en/glsa/glsa-201203-14.xml
www.gentoo.org/security/en/glsa/glsa-201203-16.xml
www.openwall.com/lists/oss-security/2011/08/10/4
www.openwall.com/lists/oss-security/2011/08/12/4
www.osvdb.org/74209
www.securityfocus.com/bid/48979
exchange.xforce.ibmcloud.com/vulnerabilities/68984