CVE-2011-2911
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
07/06/2012
Last modified:
11/04/2025
Description
Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:konstanty_bialkowski:libmodplug:*:*:*:*:*:*:*:* | 0.8.8.3 (including) | |
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://jira.atheme.org/browse/AUDPLUG-394
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
- http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba%3Dcommitdiff%3Bh%3D2d4c56de314ab13e4437bd8b609f0b751066eee8
- http://rhn.redhat.com/errata/RHSA-2011-1264.html
- http://secunia.com/advisories/45131
- http://secunia.com/advisories/45658
- http://secunia.com/advisories/45742
- http://secunia.com/advisories/45901
- http://secunia.com/advisories/46032
- http://secunia.com/advisories/46043
- http://secunia.com/advisories/46793
- http://secunia.com/advisories/48058
- http://secunia.com/advisories/48434
- http://secunia.com/advisories/48439
- http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
- http://ubuntu.com/usn/usn-1255-1
- http://www.debian.org/security/2012/dsa-2415
- http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
- http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
- http://www.openwall.com/lists/oss-security/2011/08/10/4
- http://www.openwall.com/lists/oss-security/2011/08/12/4
- http://www.osvdb.org/74208
- http://www.securityfocus.com/bid/48979
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68983
- http://jira.atheme.org/browse/AUDPLUG-394
- http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063786.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066044.html
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
- http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba%3Dcommitdiff%3Bh%3D2d4c56de314ab13e4437bd8b609f0b751066eee8
- http://rhn.redhat.com/errata/RHSA-2011-1264.html
- http://secunia.com/advisories/45131
- http://secunia.com/advisories/45658
- http://secunia.com/advisories/45742
- http://secunia.com/advisories/45901
- http://secunia.com/advisories/46032
- http://secunia.com/advisories/46043
- http://secunia.com/advisories/46793
- http://secunia.com/advisories/48058
- http://secunia.com/advisories/48434
- http://secunia.com/advisories/48439
- http://sourceforge.net/projects/modplug-xmms/files/libmodplug/0.8.8.4/
- http://ubuntu.com/usn/usn-1255-1
- http://www.debian.org/security/2012/dsa-2415
- http://www.gentoo.org/security/en/glsa/glsa-201203-14.xml
- http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
- http://www.openwall.com/lists/oss-security/2011/08/10/4
- http://www.openwall.com/lists/oss-security/2011/08/12/4
- http://www.osvdb.org/74208
- http://www.securityfocus.com/bid/48979
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68983