Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Tracker | Modplug | * | 1.17.02.43 (including) |
| Red Hat Enterprise Linux 4 | RedHat | gstreamer-plugins-0:0.8.5-1.EL.3 | * |
| Gst-plugins-bad0.10 | Ubuntu | dapper | * |
| Gst-plugins-bad0.10 | Ubuntu | edgy | * |
| Libmodplug | Ubuntu | dapper | * |
| Libmodplug | Ubuntu | edgy | * |