Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-4192

Опубликовано: 17 авг. 2006
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5.1

Описание

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

0.10.5-4ubuntu1
edgy

ignored

end of life, was needed
feisty

not-affected

0.10.4-1ubuntu1
gutsy

not-affected

0.10.5-4ubuntu1
hardy

not-affected

0.10.5-4ubuntu1
intrepid

not-affected

0.10.5-4ubuntu1
jaunty

not-affected

0.10.5-4ubuntu1
karmic

not-affected

0.10.5-4ubuntu1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

1:0.7-5ubuntu0.6.06.1
devel

not-affected

1:0.7-5.2build1
edgy

released

1:0.7-5ubuntu0.6.06.1
feisty

not-affected

1:0.7-5.2build1
gutsy

not-affected

1:0.7-5.2build1
hardy

not-affected

1:0.7-5.2build1
intrepid

not-affected

1:0.7-5.2build1
jaunty

not-affected

1:0.7-5.2build1
karmic

not-affected

1:0.7-5.2build1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 95%
0.18195
Средний

5.1 Medium

CVSS2

Связанные уязвимости

redhat
почти 19 лет назад

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

nvd
около 19 лет назад

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

debian
около 19 лет назад

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and ...

github
больше 3 лет назад

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

fstec
больше 18 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 95%
0.18195
Средний

5.1 Medium

CVSS2