Vulnerability Description
Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Konstanty Bialkowski | Libmodplug | <= 0.8.6 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526084
- http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_
- http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms%3Ba=commit
- http://osvdb.org/54109
- http://secunia.com/advisories/34927Vendor Advisory
- http://secunia.com/advisories/35026
- http://secunia.com/advisories/35736
- http://secunia.com/advisories/36158
- http://security.gentoo.org/glsa/glsa-200907-07.xml
- http://sourceforge.net/project/shownotes.php?release_id=678622&group_id=1275Patch
- http://sourceforge.net/tracker/?func=detail&aid=2777467&group_id=1275&atid=30127Patch
- http://www.debian.org/security/2009/dsa-1850
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:128
- http://www.openwall.com/lists/oss-security/2009/04/29/5
- http://www.securityfocus.com/bid/34747Patch
FAQ
What is CVE-2009-1513?
CVE-2009-1513 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long...
How severe is CVE-2009-1513?
CVE-2009-1513 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1513?
Check the references section above for vendor advisories and patch information. Affected products include: Konstanty Bialkowski Libmodplug.