Your submission was sent successfully! Close

CVE-2011-1574

Published: 9 May 2011

Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.

Priority

Medium

Status

Package Release Status
gst-plugins-bad0.10
Launchpad, Ubuntu, Debian
dapper Ignored
(reached end-of-life)
hardy Ignored
(reached end-of-life)
lucid Not vulnerable
(uses system libmodplug)
maverick Not vulnerable
(uses system libmodplug)
natty Not vulnerable
(uses system libmodplug)
upstream Needs triage

libmodplug
Launchpad, Ubuntu, Debian
dapper Ignored
(reached end-of-life)
hardy Ignored
(reached end-of-life)
lucid
Released (1:0.8.7-1ubuntu0.2)
maverick
Released (1:0.8.8.1-1ubuntu1.2)
natty
Released (1:0.8.8.1-2ubuntu0.2)
upstream
Released (0.8.8.2)