Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libmodplug | Konstanty_bialkowski | * | 0.8.5 (including) |
Libmodplug | Konstanty_bialkowski | 0.8 (including) | 0.8 (including) |
Libmodplug | Konstanty_bialkowski | 0.8.4 (including) | 0.8.4 (including) |
Gst-plugins-bad0.10 | Ubuntu | dapper | * |
Gst-plugins-bad0.10 | Ubuntu | hardy | * |
Gst-plugins-bad0.10 | Ubuntu | intrepid | * |
Libmodplug | Ubuntu | dapper | * |
Libmodplug | Ubuntu | hardy | * |
Libmodplug | Ubuntu | intrepid | * |
Libmodplug | Ubuntu | jaunty | * |
Libmodplug | Ubuntu | upstream | * |