CVE-2011-2912

CVSS V2 Medium 6.8 CVSS V3 None
Description
Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
Overview
  • CVE ID
  • CVE-2011-2912
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2012-06-07T19:55:04
  • Last Modified Date
  • 2023-02-13T01:20:20
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:* 1 OR 0.8.8.3
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
References
Reference URL Reference Tags
http://secunia.com/advisories/45742 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
http://ubuntu.com/usn/usn-1255-1
http://jira.atheme.org/browse/AUDPLUG-394
http://www.openwall.com/lists/oss-security/2011/08/10/4
http://secunia.com/advisories/46043 Vendor Advisory
http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commitdiff;h=f4e5295658fff000379caa122e75c9200205fe20
http://www.osvdb.org/74209
http://secunia.com/advisories/46032 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
http://rhn.redhat.com/errata/RHSA-2011-1264.html
http://www.debian.org/security/2012/dsa-2415
http://secunia.com/advisories/46793 Vendor Advisory
http://secunia.com/advisories/45901 Vendor Advisory
http://secunia.com/advisories/48058 Vendor Advisory
http://secunia.com/advisories/48439 Vendor Advisory
http://www.securityfocus.com/bid/48979
http://secunia.com/advisories/45131 Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
http://www.openwall.com/lists/oss-security/2011/08/12/4
http://secunia.com/advisories/45658 Vendor Advisory
http://secunia.com/advisories/48434 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/68984
History
Created Old Value New Value Data Type Notes
2022-05-10 08:52:54 Added to TrackCVE
2023-02-13 02:03:23 2023-02-13T01:20:20 CVE Modified Date updated