Description
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2226-1 | libmodplug security update |
Ubuntu USN |
USN-1148-1 | libmodplug vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T22:28:41.982Z
Reserved: 2011-04-05T00:00:00.000Z
Link: CVE-2011-1574
No data.
Status : Modified
Published: 2011-05-09T22:55:01.990
Modified: 2026-04-29T01:13:23.040
Link: CVE-2011-1574
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN