Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 21 May 2009 19:03:35 -0400 (EDT)
From: "Steven M. Christey" <>
To: oss-security <>
cc: "Steven M. Christey" <>
Subject: Re: CVE Request -- libmodplug

On Tue, 21 Apr 2009, Jan Lieskovsky wrote:

>   could you please allocate a new CVE-2008-XXXX identifier for
> the following old libmodplug issue:

This wound up with a 2009 CVE by accident.

- Steve

Name: CVE-2009-1438
Status: Candidate
Reference: MISC:;r2=1.2
Reference: CONFIRM:
Reference: CONFIRM:
Reference: CONFIRM:
Reference: FEDORA:FEDORA-2009-4064
Reference: URL:
Reference: FEDORA:FEDORA-2009-4068
Reference: URL:
Reference: UBUNTU:USN-771-1
Reference: URL:
Reference: BID:30801
Reference: URL:
Reference: OSVDB:53801
Reference: URL:
Reference: SECUNIA:34797
Reference: URL:
Reference: SECUNIA:34930
Reference: URL:
Reference: SECUNIA:35026
Reference: URL:
Reference: VUPEN:ADV-2009-1104
Reference: URL:
Reference: XF:libmodplug-csoundfilereadmed-bo(50388)
Reference: URL:

Integer overflow in the CSoundFile::ReadMed function
(src/load_med.cpp) in libmodplug before 0.8.6, as used in
gstreamer-plugins, TTPlayer, and other products, allows
context-dependent attackers to execute arbitrary code via a MED file
with a crafted (1) song comment or (2) song name, which triggers a
heap-based buffer overflow, as exploited in the wild in August 2008.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.