Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 21 May 2009 19:03:35 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security <oss-security@...ts.openwall.com>
cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Request -- libmodplug


On Tue, 21 Apr 2009, Jan Lieskovsky wrote:

>   could you please allocate a new CVE-2008-XXXX identifier for
> the following old libmodplug issue:

This wound up with a 2009 CVE by accident.

- Steve


======================================================
Name: CVE-2009-1438
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438
Reference: MISC:http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&amp;r2=1.2
Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=266913
Reference: CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=677065&group_id=1275
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=496834
Reference: FEDORA:FEDORA-2009-4064
Reference: URL:http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00907.html
Reference: FEDORA:FEDORA-2009-4068
Reference: URL:http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00908.html
Reference: UBUNTU:USN-771-1
Reference: URL:http://www.ubuntu.com/usn/USN-771-1
Reference: BID:30801
Reference: URL:http://www.securityfocus.com/bid/30801
Reference: OSVDB:53801
Reference: URL:http://osvdb.org/53801
Reference: SECUNIA:34797
Reference: URL:http://secunia.com/advisories/34797
Reference: SECUNIA:34930
Reference: URL:http://secunia.com/advisories/34930
Reference: SECUNIA:35026
Reference: URL:http://secunia.com/advisories/35026
Reference: VUPEN:ADV-2009-1104
Reference: URL:http://www.vupen.com/english/advisories/2009/1104
Reference: XF:libmodplug-csoundfilereadmed-bo(50388)
Reference: URL:http://xforce.iss.net/xforce/xfdb/50388

Integer overflow in the CSoundFile::ReadMed function
(src/load_med.cpp) in libmodplug before 0.8.6, as used in
gstreamer-plugins, TTPlayer, and other products, allows
context-dependent attackers to execute arbitrary code via a MED file
with a crafted (1) song comment or (2) song name, which triggers a
heap-based buffer overflow, as exploited in the wild in August 2008.


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.