Joined: 12 May 2004
|Posted: Sun Dec 10, 2006 2:26 pm Post subject: [ GLSA 200612-04 ] ModPlug: Multiple buffer overflows
|Gentoo Linux Security Advisory
Title: ModPlug: Multiple buffer overflows (GLSA 200612-04)
Date: December 10, 2006
ModPlug contains several boundary errors that could lead to buffer overflows resulting in the possible execution of arbitrary code.
ModPlug is a library for playing MOD-like music.
Vulnerable: < 0.8-r1
Unaffected: >= 0.8-r1
Architectures: All supported architectures
Luigi Auriemma has reported various boundary errors in load_it.cpp and a boundary error in the "CSoundFile::ReadSample()" function in sndfile.cpp.
A remote attacker can entice a user to read crafted modules or ITP files, which may trigger a buffer overflow resulting in the execution of arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All ModPlug users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8-r1"