Description
In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2308-1 | libopenmpt security update |
Debian DSA |
DSA-4729-1 | libopenmpt security update |
EUVD |
EUVD-2019-7574 | In libopenmpt before 0.3.19 and 0.4.x before 0.4.9, ModPlug_InstrumentName and ModPlug_SampleName in libopenmpt_modplug.c do not restrict the lengths of libmodplug output-buffer strings in the C API, leading to a buffer overflow. |
Ubuntu USN |
USN-8206-1 | OpenMPT vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:33:16.633Z
Reserved: 2019-10-03T00:00:00.000Z
Link: CVE-2019-17113
No data.
Status : Modified
Published: 2019-10-04T00:15:10.747
Modified: 2024-11-21T04:31:43.057
Link: CVE-2019-17113
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN