Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 201203-16 ] ModPlug: User-assisted execution of arbitrary code
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Advocate
Advocate


Joined: 12 May 2004
Posts: 2663

PostPosted: Fri Mar 16, 2012 2:26 pm    Post subject: [ GLSA 201203-16 ] ModPlug: User-assisted execution of arbit Reply with quote

Gentoo Linux Security Advisory

Title: ModPlug: User-assisted execution of arbitrary code (GLSA 201203-16)
Severity: normal
Exploitable: remote
Date: March 16, 2012
Bug(s): #362503, #379557
ID: 201203-16

Synopsis

Multiple vulnerabilities in ModPlug could result in execution of
arbitrary code or Denial of Service.


Background

ModPlug is a library for playing MOD-like music.

Affected Packages

Package: media-libs/libmodplug
Vulnerable: < 0.8.8.4
Unaffected: >= 0.8.8.4
Architectures: All supported architectures


Description

Multiple vulnerabilities have been found in ModPlug:
  • The ReadS3M method in load_s3m.cpp fails to validate user-supplied
    information, which could cause a stack-based buffer overflow
    (CVE-2011-1574).
  • The "CSoundFile::ReadWav()" function in load_wav.cpp contains an
    integer overflow which could cause a heap-based buffer overflow
    (CVE-2011-2911).
  • The "CSoundFile::ReadS3M()" function in load_s3m.cpp contains
    multiple boundary errors which could cause a stack-based buffer
    overflow (CVE-2011-2912).
  • The "CSoundFile::ReadAMS()" function in load_ams.cpp contains an
    off-by-one error which could cause memory corruption (CVE-2011-2913).
  • The "CSoundFile::ReadDSM()" function in load_dms.cpp contains an
    off-by-one error which could cause memory corruption (CVE-2011-2914).
  • The "CSoundFile::ReadAMS2()" function in load_ams.cpp contains an
    off-by-one error which could cause memory corruption (CVE-2011-2915).


Impact

A remote attacker could entice a user to open a specially crafted media
file, possibly resulting in execution of arbitrary code, or a Denial of
Service condition.


Workaround

There is no known workaround at this time.

Resolution

All ModPlug users should upgrade to the latest version:
Code:
# emerge --sync
      # emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8.8.4"
   
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since August 27, 2011. It is likely that your system is already
no longer affected by this issue.


References

CVE-2011-1574
CVE-2011-2911
CVE-2011-2912
CVE-2011-2913
CVE-2011-2914
CVE-2011-2915


Last edited by GLSA on Thu Sep 04, 2014 4:30 am; edited 2 times in total
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum