Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
http://secunia.com/advisories/54388 | Vendor Advisory |
http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/ | Exploit |
http://secunia.com/advisories/54695 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2013/08/10/3 | Exploit |
http://www.debian.org/security/2013/dsa-2751 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2013-09-16 12:14
Updated : 2013-09-25 11:21
NVD link : CVE-2013-4233
Mitre link : CVE-2013-4233
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
debian
- debian_linux
konstanty_bialkowski
- libmodplug