vendor:
Libmodplug library
by:
M. Lucinskij, P. Tumenas / SEC Consult
9.3
CVSS
CRITICAL
Stack Based Buffer Overflow
119
CWE
Product Name: Libmodplug library
Affected Version From: 0.8.8.1
Affected Version To: 0.8.8.1
Patch Exists: YES
Related CWE: N/A
CPE: a:modplug-xmms:libmodplug
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: UModPlayer, VideoLAN Client, PyModPlug, Gstreamer
2011
Libmodplug ReadS3M Stack Overflow
Libmodplug library is prone to a stack based buffer overflow vulnerability due to insufficient validation of user supplied data. An attacker is able to execute arbitrary code in the context of the user when opening malicious S3M media files. Vulnerability exists in ReadS3M method, vulnerable code is located in load_s3m.cpp (excerpt): WORD ptr[256];...memset(ptr, 0, sizeof(ptr));if (nins+npat){memcpy(ptr, lpStream+dwMemPos, 2*(nins+npat)); variables nins and npat are controlled by user and are read from supplied file without any validation. These parameters directly influence the amount of data to be copied, this can be uesed to overflow the stack.
Mitigation:
Upgrade to the latest version of Libmodplug library (0.8.8.2)