CVE-2011-2912
Publication date 6 October 2011
Last updated 24 July 2024
Ubuntu priority
Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
Status
Package | Ubuntu Release | Status |
---|---|---|
gst-plugins-bad0.10 | 11.10 oneiric |
Not affected
|
11.04 natty |
Not affected
|
|
10.10 maverick |
Not affected
|
|
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy | Ignored end of life | |
libmodplug | 11.10 oneiric |
Fixed 1:0.8.8.2-3ubuntu1.1
|
11.04 natty |
Fixed 1:0.8.8.1-2ubuntu0.3
|
|
10.10 maverick |
Fixed 1:0.8.8.1-1ubuntu1.3
|
|
10.04 LTS lucid |
Fixed 1:0.8.7-1ubuntu0.3
|
|
8.04 LTS hardy | Ignored end of life |
Patch details
Package | Patch details |
---|---|
libmodplug |
References
Related Ubuntu Security Notices (USN)
- USN-1255-1
- libmodplug vulnerabilities
- 9 November 2011