Описание
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life |
| devel | not-affected | uses system libmodplug |
| hardy | ignored | end of life |
| lucid | not-affected | uses system libmodplug |
| maverick | not-affected | uses system libmodplug |
| natty | not-affected | uses system libmodplug |
| upstream | needs-triage |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life |
| devel | not-affected | 1:0.8.8.2-3 |
| hardy | ignored | end of life |
| lucid | released | 1:0.8.7-1ubuntu0.2 |
| maverick | released | 1:0.8.8.1-1ubuntu1.2 |
| natty | released | 1:0.8.8.1-2ubuntu0.2 |
| upstream | released | 0.8.8.2 |
Показывать по
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in l ...
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
6.8 Medium
CVSS2