CVE-2006-4192
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2006
Last modified:
03/04/2025
Description
Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
Impact
Base Score 2.0
5.10
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:modplug:tracker:*:*:*:*:*:*:*:* | 1.17.02.43 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://aluigi.altervista.org/adv/mptho-adv.txt
- http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac
- http://secunia.com/advisories/21418
- http://secunia.com/advisories/22080
- http://secunia.com/advisories/22658
- http://secunia.com/advisories/23294
- http://secunia.com/advisories/23555
- http://secunia.com/advisories/26979
- http://security.gentoo.org/glsa/glsa-200612-04.xml
- http://securityreason.com/securityalert/1397
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A001
- http://www.novell.com/linux/security/advisories/2006_23_sr.html
- http://www.securityfocus.com/archive/1/442721/100/100/threaded
- http://www.securityfocus.com/bid/19448
- http://www.ubuntu.com/usn/usn-521-1
- http://www.vupen.com/english/advisories/2006/3231
- http://www.vupen.com/english/advisories/2006/4310
- https://bugzilla.redhat.com/show_bug.cgi?id=497154
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28305
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28309
- https://rhn.redhat.com/errata/RHSA-2011-0477.html
- http://aluigi.altervista.org/adv/mptho-adv.txt
- http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac
- http://secunia.com/advisories/21418
- http://secunia.com/advisories/22080
- http://secunia.com/advisories/22658
- http://secunia.com/advisories/23294
- http://secunia.com/advisories/23555
- http://secunia.com/advisories/26979
- http://security.gentoo.org/glsa/glsa-200612-04.xml
- http://securityreason.com/securityalert/1397
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A001
- http://www.novell.com/linux/security/advisories/2006_23_sr.html
- http://www.securityfocus.com/archive/1/442721/100/100/threaded
- http://www.securityfocus.com/bid/19448
- http://www.ubuntu.com/usn/usn-521-1
- http://www.vupen.com/english/advisories/2006/3231
- http://www.vupen.com/english/advisories/2006/4310
- https://bugzilla.redhat.com/show_bug.cgi?id=497154
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28305
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28309
- https://rhn.redhat.com/errata/RHSA-2011-0477.html