A denial of service flaw was found in the MikMod player, used for playing MOD files. If an attacker would trick the mikmod user to load an XM file, this could lead to denial of service (application crash). References: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339 Patch: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=31.xm-header.patch;att=1;bug=476339
This issue does NOT affect the versions of the mikmod package, as shipped with Red Hat Enterprise Linux 2.1 and 3. This issue affects the versions of the mikmod package, as shipped with Red Hat Enterprise Linux 4 and 5. This issue affects the versions of the libmikmod package, as shipped with Fedora releases of 9, 10 and devel. This issue does NOT affect the versions of the mikmod package, as shipped with Fedora releases of 9, 10 and devel (the libmikmod part was extracted to a separate 'libmikmod' package).
The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
CVE-2009-0179: libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.
This issue affects, and has not been corrected in, Fedora 10, 11, and rawhide: ~/cvs-scratch/fedora/libmikmod/F-11/libmikmod-3.2.0-beta2/ >% patch -p1 <~/31.xm-header.patch patching file loaders/load_xm.c patching file playercode/mloader.c Hunk #1 succeeded at 451 (offset 1 line).
libmikmod-3.2.0-5.beta2.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/libmikmod-3.2.0-5.beta2.fc11
libmikmod-3.2.0-4.beta2.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/libmikmod-3.2.0-4.beta2.fc10
libmikmod-3.2.0-4.beta2.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
libmikmod-3.2.0-5.beta2.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
Reading the patch, this is more of a bug than a security flaw. The problem seems to be triggered by certain valid XM files that mikmod incorrectly recognizes as invalid (load_xm.c part of the patch). Missing loading return value check in mloader.c can cause mikmod to choke as 'of' may be left in inconsistent state. of.numsmp may be non-zero, but failure in LoadInstruments() will cause samples[] array allocation to be skipped, leading to NULL pointer dereference crash. The patch is already included in Fedora packages. There's not plan to backport a fix for this crash-only bug to mikmod packages in Red Hat Enterprise Linux 3, 4, and 5.