Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200612-04] ModPlug: Multiple buffer overflows Vulnerability Scan
Vulnerability Scan Summary
ModPlug: Multiple buffer overflows
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200612-04
(ModPlug: Multiple buffer overflows)
Luigi Auriemma has reported various boundary errors in load_it.cpp and
a boundary error in the "CSoundFile::ReadSample()" function in
A remote attacker can entice a user to read crafted modules or ITP
files, which may trigger a buffer overflow resulting in the execution
of arbitrary code with the rights of the user running the
There is no known workaround at this time.
All ModPlug users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8-r1"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.