GLSA-200907-07 : ModPlug: User-assisted execution of arbitrary code

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200907-07
(ModPlug: User-assisted execution of arbitrary code)

Two vulnerabilities have been reported in ModPlug:
dummy reported an integer overflow in the CSoundFile::ReadMed()
function when processing a MED file with a crafted song comment or song
name, which triggers a heap-based buffer overflow (CVE-2009-1438).
Manfred Tremmel and Stanislav Brabec reported a buffer overflow in the
PATinst() function when processing a long instrument name
The GStreamer Bad plug-ins (gst-plugins-bad) before 0.10.11 built a
vulnerable copy of ModPlug.

Impact :

A remote attacker could entice a user to read specially crafted files,
possibly resulting in the execution of arbitrary code with the
privileges of the user running the application.

Workaround :

There is no known workaround at this time.

See also :

Solution :

All ModPlug users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-libs/libmodplug-0.8.7'
gst-plugins-bad 0.10.11 and later versions do not include the ModPlug
plug-in (it has been moved to media-plugins/gst-plugins-modplug). All
gst-plugins-bad users should upgrade to the latest version and install
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-libs/gst-plugins-bad-0.10.11'
# emerge --ask --verbose 'media-plugins/gst-plugins-modplug'

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 39778 (gentoo_GLSA-200907-07.nasl)

Bugtraq ID: 30801

CVE ID: CVE-2009-1438

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now