GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sun Dec 10, 2006 2:26 pm Post subject: [ GLSA 200612-04 ] ModPlug: Multiple buffer overflows |
|
|
Gentoo Linux Security Advisory
Title: ModPlug: Multiple buffer overflows (GLSA 200612-04)
Severity: normal
Exploitable: remote
Date: December 10, 2006
Bug(s): #143404
ID: 200612-04
Synopsis
ModPlug contains several boundary errors that could lead to buffer overflows resulting in the possible execution of arbitrary code.
Background
ModPlug is a library for playing MOD-like music.
Affected Packages
Package: media-libs/libmodplug
Vulnerable: < 0.8-r1
Unaffected: >= 0.8-r1
Architectures: All supported architectures
Description
Luigi Auriemma has reported various boundary errors in load_it.cpp and a boundary error in the "CSoundFile::ReadSample()" function in sndfile.cpp.
Impact
A remote attacker can entice a user to read crafted modules or ITP files, which may trigger a buffer overflow resulting in the execution of arbitrary code with the privileges of the user running the application.
Workaround
There is no known workaround at this time.
Resolution
All ModPlug users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8-r1" |
References
CVE-2006-4192 |
|