ALT-PU-2014-2128-1
Package libmodplug updated to version 0.8.8.5-alt1 for branch sisyphus in task 129585.
Closed vulnerabilities
BDU:2015-03019
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09742
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2013-4233
Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
- http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/
- http://secunia.com/advisories/54388
- http://secunia.com/advisories/54695
- http://www.debian.org/security/2013/dsa-2751
- http://www.openwall.com/lists/oss-security/2013/08/10/3
- http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/
- http://secunia.com/advisories/54388
- http://secunia.com/advisories/54695
- http://www.debian.org/security/2013/dsa-2751
- http://www.openwall.com/lists/oss-security/2013/08/10/3
Modified: 2025-04-11
CVE-2013-4234
Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
- http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/
- http://secunia.com/advisories/54388
- http://secunia.com/advisories/54695
- http://www.debian.org/security/2013/dsa-2751
- http://www.openwall.com/lists/oss-security/2013/08/10/3
- http://www.securityfocus.com/bid/61714
- http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/
- http://secunia.com/advisories/54388
- http://secunia.com/advisories/54695
- http://www.debian.org/security/2013/dsa-2751
- http://www.openwall.com/lists/oss-security/2013/08/10/3
- http://www.securityfocus.com/bid/61714