CVE-2011-1574

Publication date 9 May 2011

Last updated 24 July 2024


Ubuntu priority

Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.

Status

Package Ubuntu Release Status
gst-plugins-bad0.10 11.04 natty
Not affected
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
8.04 LTS hardy Ignored end of life
6.06 LTS dapper Ignored end of life
libmodplug 11.04 natty
Fixed 1:0.8.8.1-2ubuntu0.2
10.10 maverick
Fixed 1:0.8.8.1-1ubuntu1.2
10.04 LTS lucid
Fixed 1:0.8.7-1ubuntu0.2
8.04 LTS hardy Ignored end of life
6.06 LTS dapper Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libmodplug

References

Related Ubuntu Security Notices (USN)

    • USN-1148-1
    • libmodplug vulnerabilities
    • 13 June 2011

Other references