ModPlug: Multiple buffer overflows
Gentoo Linux Security Advisory
||GLSA 200612-04 / libmodplug
||December 10, 2006
||December 10, 2006: 01
All supported architectures
ModPlug contains several boundary errors that could lead to buffer
overflows resulting in the possible execution of arbitrary code.
ModPlug is a library for playing MOD-like music.
Luigi Auriemma has reported various boundary errors in load_it.cpp and
a boundary error in the "CSoundFile::ReadSample()" function in
A remote attacker can entice a user to read crafted modules or ITP
files, which may trigger a buffer overflow resulting in the execution
of arbitrary code with the privileges of the user running the
There is no known workaround at this time.
All ModPlug users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8-r1"