Impact
A heap buffer overflow has been identified in yoyofr modizer’s libraries, where an improper restriction of operations within a memory buffer permits memory overwrite beyond intended bounds. This flaw can be leveraged to execute arbitrary code, potentially allowing attackers to gain full control of the affected system. The weakness corresponds to the Common Weakness Enumeration CWE‑119.
Affected Systems
The vulnerability impacts yoyofr modizer installations prior to version 4.3, specifically those including the affected libopenmpt/openmpt‑trunk libraries and modules that process program files such as imap.C.
Risk and Exploitability
The CVSS score of 9.4 categorizes this issue as critical, indicating a severe impact if exploited. EPSS data and KEV listing are not available, leaving the exact exploitation probability unknown, but the high severity warrants immediate attention. The described attack likely requires manipulation of program files like imap.C to trigger the overflow; therefore the attack vector is inferred to be local or dependent on the attacker’s ability to control such files.
OpenCVE Enrichment