CVE-2011-1761
Publication date 5 May 2011
Last updated 24 July 2024
Ubuntu priority
Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.
Status
Package | Ubuntu Release | Status |
---|---|---|
gst-plugins-bad0.10 | ||
libmodplug | ||
Notes
mdeslaur
PoC: http://www.exploit-db.com/exploits/17222/ first commit listed causes regression when file starts with a blank line, backing out.
Patch details
References
Related Ubuntu Security Notices (USN)
- USN-1148-1
- libmodplug vulnerabilities
- 13 June 2011