Vulnerability CVE-2011-1761


Published: 2012-06-07

Description:
Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.

See advisories in our WLB2 database:
Topic
Author
Date
High
libmodplug <= 0.8.8.2 .abc stack-based buffer overflow poc
epiphant
08.06.2012

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Konstanty bialkowski -> Libmodplug 

 References:
http://www.osvdb.org/72157
http://www.openwall.com/lists/oss-security/2011/05/02/19
http://www.openwall.com/lists/oss-security/2011/05/02/1
http://www.exploit-db.com/exploits/17222
http://www.debian.org/security/2012/dsa-2415
http://ubuntu.com/usn/usn-1148-1
http://secunia.com/advisories/48058
http://secunia.com/advisories/45742
http://secunia.com/advisories/44870
http://secunia.com/advisories/44695
http://secunia.com/advisories/44388
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html

Copyright 2024, cxsecurity.com

 

Back to Top