Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-4192

Опубликовано: 17 авг. 2006
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5.1

Описание

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

0.10.5-4ubuntu1
edgy

ignored

end of life, was needed
feisty

not-affected

0.10.4-1ubuntu1
gutsy

not-affected

0.10.5-4ubuntu1
hardy

not-affected

0.10.5-4ubuntu1
intrepid

not-affected

0.10.5-4ubuntu1
jaunty

not-affected

0.10.5-4ubuntu1
karmic

not-affected

0.10.5-4ubuntu1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

1:0.7-5ubuntu0.6.06.1
devel

not-affected

1:0.7-5.2build1
edgy

released

1:0.7-5ubuntu0.6.06.1
feisty

not-affected

1:0.7-5.2build1
gutsy

not-affected

1:0.7-5.2build1
hardy

not-affected

1:0.7-5.2build1
intrepid

not-affected

1:0.7-5.2build1
jaunty

not-affected

1:0.7-5.2build1
karmic

not-affected

1:0.7-5.2build1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 95%
0.18195
Средний

5.1 Medium

CVSS2

Связанные уязвимости

redhat
больше 19 лет назад

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

nvd
больше 19 лет назад

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

debian
больше 19 лет назад

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and ...

github
почти 4 года назад

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

fstec
около 19 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 95%
0.18195
Средний

5.1 Medium

CVSS2