CVE-2007-6732

Source
https://nvd.nist.gov/vuln/detail/CVE-2007-6732
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2007-6732.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2007-6732
Published
2009-09-13T22:30:00Z
Modified
2024-11-21T00:40:52Z
Summary
[none]
Details

Multiple buffer overflows in the dttload function in loaders/dttload.c Extended Module Player (XMP) 2.5.1 and earlier allow remote attackers to execute arbitrary code via unspecified vectors related to an untrusted length value and the (1) pofs and (2) plen arrays.

References

Affected packages

Debian:11 / xmp

Package

Name
xmp
Purl
pkg:deb/debian/xmp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.1-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / xmp

Package

Name
xmp
Purl
pkg:deb/debian/xmp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.1-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / xmp

Package

Name
xmp
Purl
pkg:deb/debian/xmp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.1-1

Ecosystem specific

{
    "urgency": "low"
}