Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tracker | Modplug | * | 1.17.02.43 (including) |
Gst-plugins-bad0.10 | Ubuntu | dapper | * |
Gst-plugins-bad0.10 | Ubuntu | edgy | * |
Libmodplug | Ubuntu | dapper | * |
Libmodplug | Ubuntu | edgy | * |
Red Hat Enterprise Linux 4 | RedHat | gstreamer-plugins-0:0.8.5-1.EL.3 | * |