CVE-2006-4192

Source
https://nvd.nist.gov/vuln/detail/CVE-2006-4192
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-4192.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2006-4192
Published
2006-08-17T01:04:00Z
Modified
2024-11-21T00:15:21Z
Summary
[none]
Details

Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

References

Affected packages

Debian:11 / libmodplug

Package

Name
libmodplug
Purl
pkg:deb/debian/libmodplug?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.7-5.2

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / libmodplug

Package

Name
libmodplug
Purl
pkg:deb/debian/libmodplug?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.7-5.2

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / libmodplug

Package

Name
libmodplug
Purl
pkg:deb/debian/libmodplug?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:0.7-5.2

Ecosystem specific

{
    "urgency": "medium"
}