CVE-2009-1438

Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*

History

07 Nov 2023, 02:03

Type Values Removed Values Added
References
  • {'url': 'http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&r2=1.2', 'name': 'http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&r2=1.2', 'tags': [], 'refsource': 'MISC'}
  • () http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&amp%3Br2=1.2 -

Information

Published : 2009-04-27 18:00

Updated : 2023-12-10 10:51


NVD link : CVE-2009-1438

Mitre link : CVE-2009-1438

CVE.ORG link : CVE-2009-1438


JSON object : View

Products Affected

konstanty_bialkowski

  • libmodplug
CWE
CWE-189

Numeric Errors