CVE-2011-1761

Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:*
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:*
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:26

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html - () http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html -
References () http://secunia.com/advisories/44388 - Vendor Advisory () http://secunia.com/advisories/44388 - Vendor Advisory
References () http://secunia.com/advisories/44695 - Vendor Advisory () http://secunia.com/advisories/44695 - Vendor Advisory
References () http://secunia.com/advisories/44870 - Vendor Advisory () http://secunia.com/advisories/44870 - Vendor Advisory
References () http://secunia.com/advisories/45742 - Vendor Advisory () http://secunia.com/advisories/45742 - Vendor Advisory
References () http://secunia.com/advisories/48058 - Vendor Advisory () http://secunia.com/advisories/48058 - Vendor Advisory
References () http://ubuntu.com/usn/usn-1148-1 - () http://ubuntu.com/usn/usn-1148-1 -
References () http://www.debian.org/security/2012/dsa-2415 - () http://www.debian.org/security/2012/dsa-2415 -
References () http://www.exploit-db.com/exploits/17222 - () http://www.exploit-db.com/exploits/17222 -
References () http://www.openwall.com/lists/oss-security/2011/05/02/1 - () http://www.openwall.com/lists/oss-security/2011/05/02/1 -
References () http://www.openwall.com/lists/oss-security/2011/05/02/19 - () http://www.openwall.com/lists/oss-security/2011/05/02/19 -
References () http://www.osvdb.org/72157 - () http://www.osvdb.org/72157 -

07 Nov 2023, 02:07

Type Values Removed Values Added
Summary Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information. Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.

Information

Published : 2012-06-07 19:55

Updated : 2024-11-21 01:26


NVD link : CVE-2011-1761

Mitre link : CVE-2011-1761

CVE.ORG link : CVE-2011-1761


JSON object : View

Products Affected

konstanty_bialkowski

  • libmodplug
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer