6.8
CVSSv2

CVE-2011-1574

Published: 09/05/2011 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug prior to 0.8.8.2 allows remote malicious users to execute arbitrary code via a crafted S3M file.

Vulnerable Product Search on Vulmon Subscribe to Product

konstanty bialkowski libmodplug 0.8.5

konstanty bialkowski libmodplug

konstanty bialkowski libmodplug 0.8.7

konstanty bialkowski libmodplug 0.8.4

konstanty bialkowski libmodplug 0.8.8

konstanty bialkowski libmodplug 0.8

konstanty bialkowski libmodplug 0.8.6

Vendor Advisories

libmodplug could be made to run programs as your login if it opened a specially crafted file ...
M Lucinskij and P Tumenas discovered a buffer overflow in the code for processing S3M tracker files in the Modplug tracker music library, which may result in the execution of arbitrary code For the oldstable distribution (lenny), this problem has been fixed in version 084-1+lenny2 For the stable distribution (squeeze), this problem has been f ...

Exploits

## # $Id: vlc_modplug_s3mrb 12282 2011-04-08 15:48:53Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class ...