CVE-2009-1438
Publication date 27 April 2009
Last updated 24 July 2024
Ubuntu priority
Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
Status
Package | Ubuntu Release | Status |
---|---|---|
gst-plugins-bad0.10 | ||
libmodplug | ||
Patch details
Package | Patch details |
---|---|
libmodplug |
References
Related Ubuntu Security Notices (USN)
- USN-771-1
- libmodplug vulnerabilities
- 7 May 2009