Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Libmodplug | Konstanty_bialkowski | * | 0.8.5 (including) |
| Libmodplug | Konstanty_bialkowski | 0.8 (including) | 0.8 (including) |
| Libmodplug | Konstanty_bialkowski | 0.8.4 (including) | 0.8.4 (including) |
| Gst-plugins-bad0.10 | Ubuntu | dapper | * |
| Gst-plugins-bad0.10 | Ubuntu | hardy | * |
| Gst-plugins-bad0.10 | Ubuntu | intrepid | * |
| Libmodplug | Ubuntu | dapper | * |
| Libmodplug | Ubuntu | hardy | * |
| Libmodplug | Ubuntu | intrepid | * |
| Libmodplug | Ubuntu | jaunty | * |
| Libmodplug | Ubuntu | upstream | * |