Multiple buffer overflows in the dtt_load function in loaders/dtt_load.c Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers to execute arbitrary code via unspecified vectors related to an untrusted length value and the (1) pofs and (2) plen arrays.
References
Link | Resource |
---|---|
http://aluigi.altervista.org/adv/xmpbof-adv.txt | Exploit |
http://www.securityfocus.com/bid/27047 | Exploit |
http://www.vupen.com/english/advisories/2008/0009 | Vendor Advisory |
http://aluigi.altervista.org/adv/xmpbof-adv.txt | Exploit |
http://www.securityfocus.com/bid/27047 | Exploit |
http://www.vupen.com/english/advisories/2008/0009 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/xmpbof-adv.txt - Exploit | |
References | () http://www.securityfocus.com/bid/27047 - Exploit | |
References | () http://www.vupen.com/english/advisories/2008/0009 - Vendor Advisory |
Information
Published : 2009-09-13 22:30
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6732
Mitre link : CVE-2007-6732
CVE.ORG link : CVE-2007-6732
JSON object : View
Products Affected
claudio_matsuoka
- extended_module_player
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer