Back in June 2003, the Debian package owner for mikmod found a security flaw. Unfortunately it doesn't look like this got shared with vendors (I see nothing in vendor-sec archives), and we didn't update for this minor flaw. An attacker could create a malicious archive and if you can convince a victim to open that archive using mikmod you could overflow a buffer and execute code. Fix from Gentoo CVS: http://www.gentoo.org/cgi-bin/viewcvs.cgi/*checkout*/media-sound/mikmod/files/mikmod-3.1.6-security.patch?rev=1.1&content-type=text/plain
This issue also affects RHEL3, RHEL2.1
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-506.html