Mandriva Linux Security Advisory : libmodplug (MDVSA-2011:085)

Medium Nessus Plugin ID 53909


The remote Mandriva Linux host is missing one or more security updates.


A vulnerability has been found and corrected in libmodplug :

Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before allows remote attackers to execute arbitrary code via a crafted S3M file (CVE-2011-1574).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: products_id=490

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 53909

File Name: mandriva_MDVSA-2011-085.nasl

Version: $Revision: 1.9 $

Type: local

Published: 2011/05/16

Modified: 2013/06/01

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64modplug-devel, p-cpe:/a:mandriva:linux:lib64modplug0, p-cpe:/a:mandriva:linux:lib64modplug0-devel, p-cpe:/a:mandriva:linux:libmodplug-devel, p-cpe:/a:mandriva:linux:libmodplug0, p-cpe:/a:mandriva:linux:libmodplug0-devel, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/05/13

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Metasploit (VideoLAN VLC ModPlug ReadS3M Stack Buffer Overflow)

Reference Information

CVE: CVE-2011-1574

BID: 47248

MDVSA: 2011:085