Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2415-1 | libmodplug security update |
Ubuntu USN |
USN-1148-1 | libmodplug vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 28 May 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T22:37:25.759Z
Reserved: 2011-04-19T00:00:00Z
Link: CVE-2011-1761
No data.
Status : Deferred
Published: 2012-06-07T19:55:02.883
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-1761
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN