Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008.
2009-04-27T18:00:00.343
2025-04-09T00:30:58.490
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | konstanty_bialkowski | libmodplug | ≤ 0.8.5 | Yes |
Application | konstanty_bialkowski | libmodplug | 0.8 | Yes |
Application | konstanty_bialkowski | libmodplug | 0.8.4 | Yes |