5.1
CVSSv2

CVE-2006-4192

Published: 17/08/2006 Updated: 17/10/2018
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 515
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and previous versions and libmodplug 0.8 and previous versions, as used in GStreamer and possibly other products, allow user-assisted remote malicious users to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

Vulnerable Product Search on Vulmon Subscribe to Product

modplug tracker

Vendor Advisories

Debian Bug report logs - #383574 libmodplug: CVE-2006-4192: buffer/heap overflow -> arbitrary code execution as user Package: libmodplug; Maintainer for libmodplug is Stephen Kitt <skitt@debianorg>; Reported by: Alec Berryman <alec@thenednet> Date: Fri, 18 Aug 2006 03:48:09 UTC Severity: grave Tags: fixed, secur ...
Luigi Auriemma discovered that libmodplug did not properly sanitize its input A specially crafted AMF file could be used to exploit this situation to cause buffer overflows and possibly execute arbitrary code as the user ...

Exploits

/* by Luigi Auriemma */ #include <stdioh> #include <stdlibh> #include <stringh> #include <stdinth> #ifdef WIN32 #include <winsockh> // htonl #else #include <netinet/inh> #endif #define VER "01" #define HEAPOVERSZ 512 #define ITPHEAPOVERSZ 150000 #define ALLOCSAMPLESZ ...