CVE-2006-4192

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
References
Link Resource
http://aluigi.altervista.org/adv/mptho-adv.txt
http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac
http://secunia.com/advisories/21418 Vendor Advisory
http://secunia.com/advisories/22080
http://secunia.com/advisories/22658
http://secunia.com/advisories/23294
http://secunia.com/advisories/23555
http://secunia.com/advisories/26979
http://security.gentoo.org/glsa/glsa-200612-04.xml
http://securityreason.com/securityalert/1397
http://www.mandriva.com/security/advisories?name=MDKSA-2007:001
http://www.novell.com/linux/security/advisories/2006_23_sr.html
http://www.securityfocus.com/archive/1/442721/100/100/threaded
http://www.securityfocus.com/bid/19448
http://www.ubuntu.com/usn/usn-521-1
http://www.vupen.com/english/advisories/2006/3231
http://www.vupen.com/english/advisories/2006/4310
https://bugzilla.redhat.com/show_bug.cgi?id=497154
https://exchange.xforce.ibmcloud.com/vulnerabilities/28305
https://exchange.xforce.ibmcloud.com/vulnerabilities/28309
https://rhn.redhat.com/errata/RHSA-2011-0477.html
http://aluigi.altervista.org/adv/mptho-adv.txt
http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac
http://secunia.com/advisories/21418 Vendor Advisory
http://secunia.com/advisories/22080
http://secunia.com/advisories/22658
http://secunia.com/advisories/23294
http://secunia.com/advisories/23555
http://secunia.com/advisories/26979
http://security.gentoo.org/glsa/glsa-200612-04.xml
http://securityreason.com/securityalert/1397
http://www.mandriva.com/security/advisories?name=MDKSA-2007:001
http://www.novell.com/linux/security/advisories/2006_23_sr.html
http://www.securityfocus.com/archive/1/442721/100/100/threaded
http://www.securityfocus.com/bid/19448
http://www.ubuntu.com/usn/usn-521-1
http://www.vupen.com/english/advisories/2006/3231
http://www.vupen.com/english/advisories/2006/4310
https://bugzilla.redhat.com/show_bug.cgi?id=497154
https://exchange.xforce.ibmcloud.com/vulnerabilities/28305
https://exchange.xforce.ibmcloud.com/vulnerabilities/28309
https://rhn.redhat.com/errata/RHSA-2011-0477.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:modplug:tracker:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://aluigi.altervista.org/adv/mptho-adv.txt - () http://aluigi.altervista.org/adv/mptho-adv.txt -
References () http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac - () http://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=bc2cdd57d549ab3ba59782e9b395d0cd683fd3ac -
References () http://secunia.com/advisories/21418 - Vendor Advisory () http://secunia.com/advisories/21418 - Vendor Advisory
References () http://secunia.com/advisories/22080 - () http://secunia.com/advisories/22080 -
References () http://secunia.com/advisories/22658 - () http://secunia.com/advisories/22658 -
References () http://secunia.com/advisories/23294 - () http://secunia.com/advisories/23294 -
References () http://secunia.com/advisories/23555 - () http://secunia.com/advisories/23555 -
References () http://secunia.com/advisories/26979 - () http://secunia.com/advisories/26979 -
References () http://security.gentoo.org/glsa/glsa-200612-04.xml - () http://security.gentoo.org/glsa/glsa-200612-04.xml -
References () http://securityreason.com/securityalert/1397 - () http://securityreason.com/securityalert/1397 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:001 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:001 -
References () http://www.novell.com/linux/security/advisories/2006_23_sr.html - () http://www.novell.com/linux/security/advisories/2006_23_sr.html -
References () http://www.securityfocus.com/archive/1/442721/100/100/threaded - () http://www.securityfocus.com/archive/1/442721/100/100/threaded -
References () http://www.securityfocus.com/bid/19448 - () http://www.securityfocus.com/bid/19448 -
References () http://www.ubuntu.com/usn/usn-521-1 - () http://www.ubuntu.com/usn/usn-521-1 -
References () http://www.vupen.com/english/advisories/2006/3231 - () http://www.vupen.com/english/advisories/2006/3231 -
References () http://www.vupen.com/english/advisories/2006/4310 - () http://www.vupen.com/english/advisories/2006/4310 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=497154 - () https://bugzilla.redhat.com/show_bug.cgi?id=497154 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28305 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28305 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28309 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28309 -
References () https://rhn.redhat.com/errata/RHSA-2011-0477.html - () https://rhn.redhat.com/errata/RHSA-2011-0477.html -

Information

Published : 2006-08-17 01:04

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4192

Mitre link : CVE-2006-4192

CVE.ORG link : CVE-2006-4192


JSON object : View

Products Affected

modplug

  • tracker