First published: Mon Sep 16 2013(Updated: )
Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Libmodplug1 | <=0.8.8.4 | |
SUSE Libmodplug1 | =0.8 | |
SUSE Libmodplug1 | =0.8.4 | |
SUSE Libmodplug1 | =0.8.5 | |
SUSE Libmodplug1 | =0.8.6 | |
SUSE Libmodplug1 | =0.8.7 | |
SUSE Libmodplug1 | =0.8.8 | |
SUSE Libmodplug1 | =0.8.8.1 | |
SUSE Libmodplug1 | =0.8.8.2 | |
SUSE Libmodplug1 | =0.8.8.3 | |
Debian Linux | =6.0 | |
Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4233 has been classified as a critical vulnerability due to its potential to cause a denial of service and execute arbitrary code.
To fix CVE-2013-4233, update libmodplug to a version later than 0.8.8.4 that addresses this vulnerability.
CVE-2013-4233 affects libmodplug version 0.8.8.4 and earlier, as well as certain versions of Debian GNU/Linux.
CVE-2013-4233 allows remote attackers to perform a denial of service attack and possibly gain control of the affected system.
The vendor for the affected software is Konstanty Bialkowski, the developer of libmodplug.