Mandrake Linux Security Advisory : libmodplug (MDKSA-2007:001)

Medium Nessus Plugin ID 24618


The remote Mandrake Linux host is missing one or more security updates.


Multiple buffer overflows in MODPlug Tracker (OpenMPT) and earlier and libmodplug 0.8 and earlier allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.

Updated packages are patched to address this issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 24618

File Name: mandrake_MDKSA-2007-001.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2007/02/18

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.1

Temporal Score: 4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64modplug0, p-cpe:/a:mandriva:linux:lib64modplug0-devel, p-cpe:/a:mandriva:linux:libmodplug0, p-cpe:/a:mandriva:linux:libmodplug0-devel, cpe:/o:mandriva:linux:2007

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/01/02

Reference Information

CVE: CVE-2006-4192

BID: 19448

MDKSA: 2007:001