File _patchinfo of Package patchinfo.import5004
<patchinfo incident="libmodplug" version="5004"> <issue tracker="bnc" id="710726" /> <issue tracker="CVE" id="CVE-2011-2911" /> <issue tracker="CVE" id="CVE-2011-2912" /> <issue tracker="CVE" id="CVE-2011-2913" /> <issue tracker="CVE" id="CVE-2011-2914" /> <issue tracker="CVE" id="CVE-2011-2915" /> <issue tracker="CVE" id="CVE-2011-1761" /> <category>security</category> <rating>low</rating> <summary>libmodplug: Fixed multiple vulnerabilities reported in <= 0.8.8.3</summary> <description>This update of libmodplug0 fixes the following issues: 1) An integer overflow error exists within the "CSoundFile::ReadWav()" function (src/load_wav.cpp) when processing certain WAV files. This can be exploited to cause a heap-based buffer overflow by tricking a user into opening a specially crafted WAV file. (CVE-2011-2911) 2) Boundary errors within the "CSoundFile::ReadS3M()" function (src/load_s3m.cpp) when processing S3M files can be exploited to cause stack-based buffer overflows by tricking a user into opening a specially crafted S3M file. (CVE-2011-2912) 3) An off-by-one error within the "CSoundFile::ReadAMS()" function (src/load_ams.cpp) can be exploited to cause a stack corruption by tricking a user into opening a specially crafted AMS file. (CVE-2011-2913) 4) An off-by-one error within the "CSoundFile::ReadDSM()" function (src/load_dms.cpp) can be exploited to cause a memory corruption by tricking a user into opening a specially crafted DSM file. (CVE-2011-2914) 5) An off-by-one error within the "CSoundFile::ReadAMS2()" function (src/load_ams.cpp) can be exploited to cause a memory corruption by tricking a user into opening a specially crafted AMS file. (CVE-2011-2915) Also an overflow in the ABC loader was fixed. (CVE-2011-1761) </description> <packager>adrianSuSE</packager> </patchinfo>