CVE-2009-1438
Publication date 27 April 2009
Last updated 24 July 2024
Ubuntu priority
Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
Status
Package | Ubuntu Release | Status |
---|---|---|
gst-plugins-bad0.10 | 11.10 oneiric |
Not affected
|
11.04 natty |
Not affected
|
|
10.10 maverick |
Not affected
|
|
10.04 LTS lucid |
Not affected
|
|
9.10 karmic |
Not affected
|
|
9.04 jaunty |
Not affected
|
|
8.10 intrepid | Ignored end of life, was needs-triage | |
8.04 LTS hardy | Ignored end of life | |
6.06 LTS dapper | Ignored end of life | |
libmodplug | 11.10 oneiric |
Not affected
|
11.04 natty |
Not affected
|
|
10.10 maverick |
Not affected
|
|
10.04 LTS lucid |
Not affected
|
|
9.10 karmic |
Not affected
|
|
9.04 jaunty |
Fixed 1:0.8.4-3ubuntu1.1
|
|
8.10 intrepid |
Fixed 1:0.7-7ubuntu0.8.10.1
|
|
8.04 LTS hardy |
Fixed 1:0.7-7ubuntu0.8.04.1
|
|
6.06 LTS dapper |
Fixed 1:0.7-5ubuntu0.6.06.2
|
Patch details
Package | Patch details |
---|---|
libmodplug |
References
Related Ubuntu Security Notices (USN)
- USN-771-1
- libmodplug vulnerabilities
- 7 May 2009