6.8
CVSSv2

CVE-2011-1761

Published: 07/06/2012 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug prior to 0.8.8.3 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

konstanty bialkowski libmodplug 0.8.5

konstanty bialkowski libmodplug 0.8.7

konstanty bialkowski libmodplug 0.8.4

konstanty bialkowski libmodplug 0.8.8.1

konstanty bialkowski libmodplug 0.8.8

konstanty bialkowski libmodplug

konstanty bialkowski libmodplug 0.8

konstanty bialkowski libmodplug 0.8.6

Vendor Advisories

Debian Bug report logs - #625966 libmodplug1: libmodplug <= 0882 abc Stack-Based Buffer Overflow Package: libmodplug1; Maintainer for libmodplug1 is Stephen Kitt <skitt@debianorg>; Source for libmodplug1 is src:libmodplug (PTS, buildd, popcon) Reported by: Remi Denis-Courmont <remi@remlabnet> Date: Sat, 7 M ...
libmodplug could be made to run programs as your login if it opened a specially crafted file ...

Exploits

#include <libmodplug/modplugh> #include <stdioh> #include <stringh> /* libmodplug <= 0882 abc stack-based buffer overflow poc modplug-xmmssourceforgenet/ by: epiphant this exploits one of many overflows in load_abccpp lol vlc media player uses libmodplug greets: defrost, babi, ming_wisher, emel1a, av, k ...