Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-2415-1 | libmodplug security update |
![]() |
EUVD-2011-2885 | Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset. |
![]() |
USN-1255-1 | libmodplug vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T23:15:31.904Z
Reserved: 2011-07-27T00:00:00
Link: CVE-2011-2912

No data.

Status : Deferred
Published: 2012-06-07T19:55:04.367
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-2912


No data.