Upstream information

CVE-2011-1574 at MITRE

Description

Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 686624 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 11.2
  • libmodplug-debugsource >= 0.8.7-11.3.1
  • libmodplug0-debuginfo >= 0.8.7-11.3.1
openSUSE 11.2
  • libmodplug-devel >= 0.8.7-11.3.1
  • libmodplug0 >= 0.8.7-11.3.1
openSUSE 11.3
  • libmodplug-debugsource >= 0.8.7-7.3.1
  • libmodplug0-debuginfo >= 0.8.7-7.3.1
  • libmodplug0-debuginfo-32bit >= 0.8.7-7.3.1
openSUSE 11.3
  • libmodplug-devel >= 0.8.7-7.3.1
  • libmodplug0 >= 0.8.7-7.3.1
  • libmodplug0-32bit >= 0.8.7-7.3.1
openSUSE 11.4
  • libmodplug-devel >= 0.8.7-10.11.1
  • libmodplug0 >= 0.8.7-10.11.1
  • libmodplug0-32bit >= 0.8.7-10.11.1
openSUSE 11.4
  • libmodplug-debugsource >= 0.8.7-10.11.1
  • libmodplug-devel >= 0.8.7-10.11.1
  • libmodplug0 >= 0.8.7-10.11.1
  • libmodplug0-32bit >= 0.8.7-10.11.1
  • libmodplug0-debuginfo >= 0.8.7-10.11.1
  • libmodplug0-debuginfo-32bit >= 0.8.7-10.11.1
Patchnames:
libmodplug