Описание
Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-4192
- https://bugzilla.redhat.com/show_bug.cgi?id=497154
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28305
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28309
- https://rhn.redhat.com/errata/RHSA-2011-0477.html
- http://aluigi.altervista.org/adv/mptho-adv.txt
- http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac
- http://secunia.com/advisories/21418
- http://secunia.com/advisories/22080
- http://secunia.com/advisories/22658
- http://secunia.com/advisories/23294
- http://secunia.com/advisories/23555
- http://secunia.com/advisories/26979
- http://security.gentoo.org/glsa/glsa-200612-04.xml
- http://securityreason.com/securityalert/1397
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:001
- http://www.novell.com/linux/security/advisories/2006_23_sr.html
- http://www.securityfocus.com/archive/1/442721/100/100/threaded
- http://www.securityfocus.com/bid/19448
- http://www.ubuntu.com/usn/usn-521-1
- http://www.vupen.com/english/advisories/2006/3231
- http://www.vupen.com/english/advisories/2006/4310
EPSS
CVE ID
Связанные уязвимости
Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and ...
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS