First published: Mon Sep 16 2013(Updated: )
Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Libmodplug1 | <=0.8.8.4 | |
SUSE Libmodplug1 | =0.8 | |
SUSE Libmodplug1 | =0.8.4 | |
SUSE Libmodplug1 | =0.8.5 | |
SUSE Libmodplug1 | =0.8.6 | |
SUSE Libmodplug1 | =0.8.7 | |
SUSE Libmodplug1 | =0.8.8 | |
SUSE Libmodplug1 | =0.8.8.1 | |
SUSE Libmodplug1 | =0.8.8.2 | |
SUSE Libmodplug1 | =0.8.8.3 | |
Debian Linux | =6.0 | |
Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4234 is classified as a high severity vulnerability due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2013-4234, update libmodplug to version 0.8.8.5 or later, which addresses the heap-based buffer overflow vulnerabilities.
CVE-2013-4234 can lead to denial of service attacks through memory corruption and potentially allow attackers to execute arbitrary code.
CVE-2013-4234 affects libmodplug versions 0.8.8.4 and earlier.
Yes, CVE-2013-4234 can be exploited remotely through crafted ABC files.