File _patchinfo of Package patchinfo.import5004

<patchinfo incident="libmodplug" version="5004">
  <issue tracker="bnc" id="710726" />
  <issue tracker="CVE" id="CVE-2011-2911" />
  <issue tracker="CVE" id="CVE-2011-2912" />
  <issue tracker="CVE" id="CVE-2011-2913" />
  <issue tracker="CVE" id="CVE-2011-2914" />
  <issue tracker="CVE" id="CVE-2011-2915" />
  <issue tracker="CVE" id="CVE-2011-1761" />
  <category>security</category>
  <rating>low</rating>
  <summary>libmodplug: Fixed multiple vulnerabilities reported in &lt;= 0.8.8.3</summary>
  <description>This update of libmodplug0 fixes the following issues:

1) An integer overflow error exists within the
&quot;CSoundFile::ReadWav()&quot; function (src/load_wav.cpp) when
processing certain WAV files. This can be exploited to
cause a heap-based buffer overflow by tricking a user into
opening a specially crafted WAV file. (CVE-2011-2911)

2) Boundary errors within the &quot;CSoundFile::ReadS3M()&quot;
function (src/load_s3m.cpp) when processing S3M files can
be exploited to cause stack-based buffer overflows by
tricking a user into opening a specially crafted S3M file.
(CVE-2011-2912)


3) An off-by-one error within the &quot;CSoundFile::ReadAMS()&quot;
function (src/load_ams.cpp) can be exploited to cause a
stack corruption by tricking a user into opening a
specially crafted AMS file. (CVE-2011-2913)

4) An off-by-one error within the &quot;CSoundFile::ReadDSM()&quot;
function (src/load_dms.cpp) can be exploited to cause a
memory corruption by tricking a user into opening a
specially crafted DSM file. (CVE-2011-2914)

5) An off-by-one error within the &quot;CSoundFile::ReadAMS2()&quot;
function (src/load_ams.cpp) can be exploited to cause a
memory corruption by tricking a user into opening a
specially crafted AMS file. (CVE-2011-2915)

Also an overflow in the ABC loader was fixed.
(CVE-2011-1761)
</description>
  <packager>adrianSuSE</packager>
</patchinfo>
openSUSE Build Service is sponsored by