Bug 499006 (CVE-2009-1513) - CVE-2009-1513 libmodplug: buffer overflow vulnerability
Summary: CVE-2009-1513 libmodplug: buffer overflow vulnerability
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2009-1513
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://web.nvd.nist.gov/view/vuln/det...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-05-04 19:04 UTC by Vincent Danen
Modified: 2021-11-12 19:57 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2011-05-03 09:14:18 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2009-05-04 19:04:06 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-1513 to
the following vulnerability:

Name: CVE-2009-1513
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1513
Assigned: 20090504
Reference: CONFIRM: http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms;a=commitdiff;h=c4ebb701be6ee9a296a44fdac5a20b7739ff0595
Reference: CONFIRM: http://sourceforge.net/project/shownotes.php?release_id=678622&group_id=1275
Reference: CONFIRM: http://sourceforge.net/tracker/?func=detail&aid=2777467&group_id=1275&atid=301275
Reference: BID:34747
Reference: URL: http://www.securityfocus.com/bid/34747
Reference: OSVDB:54109
Reference: URL: http://osvdb.org/54109
Reference: SECUNIA:34927
Reference: URL: http://secunia.com/advisories/34927
Reference: VUPEN:ADV-2009-1200
Reference: URL: http://www.vupen.com/english/advisories/2009/1200

Buffer overflow in the PATinst function in src/load_pat.cpp in
libmodplug before 0.8.7 allows user-assisted remote attackers to cause
a denial of service and possibly execute arbitrary code via a long
instrument name.

Comment 1 Ville Skyttä 2009-05-04 22:24:00 UTC
F-9 and F-10 already have 0.8.7:
https://admin.fedoraproject.org/updates/search/libmodplug

F-11 will have it as well:
https://fedorahosted.org/rel-eng/ticket/1660

EPEL-5 has it in testing, signers have been notified (but libmodplug needs a real EPEL maintainer):
https://www.redhat.com/archives/epel-devel-list/2009-April/msg00047.html

Comment 2 Vincent Danen 2009-05-11 16:30:07 UTC
The version of libmodplug that is embedded in the gstreamer-plugins package for Red Hat Enterprise Linux 3 and 4 is version 0.7 which does not include support for PAT files and is thus not affected by this vulnerability.

Comment 3 Ville Skyttä 2011-05-03 08:16:16 UTC
I suppose this bug can be closed now?


Note You need to log in before you can comment on or make changes to this bug.