CVE-2019-17113
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
04/10/2019
Last modified:
02/08/2020
Description
In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openmpt:libopenmpt:*:*:*:*:*:*:*:* | 0.3.19 (excluding) | |
| cpe:2.3:a:openmpt:libopenmpt:*:*:*:*:*:*:*:* | 0.4.0 (including) | 0.4.9 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00044.html
- https://github.com/OpenMPT/openmpt/commit/927688ddab43c2b203569de79407a899e734fabe
- https://github.com/OpenMPT/openmpt/compare/libopenmpt-0.3.18...libopenmpt-0.3.19
- https://github.com/OpenMPT/openmpt/compare/libopenmpt-0.4.8...libopenmpt-0.4.9
- https://lists.debian.org/debian-lts-announce/2020/08/msg00003.html
- https://source.openmpt.org/browse/openmpt/trunk/OpenMPT/?op=revision&rev=12127&peg=12127
- https://www.debian.org/security/2020/dsa-4729



