Advisories Blog | G5 Cyber Security

Mandriva Linux Security Advisory 2009-128

Mandriva Linux Security Advisory 2009-128 – Multiple security vulnerabilities has been identified and fixed in libmodplug. Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow. Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name. The updated packages have been patched to prevent this. Packages for 2008.0 are being provided due to extended support for Corporate products.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/83422/MDVSA-2009-128-1.txt

Source: https://packetstormsecurity.com/files/83422/Mandriva-Linux-Security-Advisory-2009-128.html

Exit mobile version