Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2011-1574
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.67
EPSS Ranking
98.5%
CVSS Severity
CVSS v2 Score
6.8
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091
http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b
http://openwall.com/lists/oss-security/2011/04/11/13
http://openwall.com/lists/oss-security/2011/04/11/6
http://secunia.com/advisories/44870
http://secunia.com/advisories/48434
http://securityreason.com/securityalert/8243
http://securitytracker.com/id?1025480
http://www.debian.org/security/2011/dsa-2226
http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2011:085
https://bugzilla.redhat.com/show_bug.cgi?id=695420
https://rhn.redhat.com/errata/RHSA-2011-0477.html
https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt
https://www.ubuntu.com/usn/USN-1148-1/
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091
http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms%3Ba=commit%3Bh=aecef259828a89bb00c2e6f78e89de7363b2237b
http://openwall.com/lists/oss-security/2011/04/11/13
http://openwall.com/lists/oss-security/2011/04/11/6
http://secunia.com/advisories/44870
http://secunia.com/advisories/48434
http://securityreason.com/securityalert/8243
http://securitytracker.com/id?1025480
http://www.debian.org/security/2011/dsa-2226
http://www.gentoo.org/security/en/glsa/glsa-201203-16.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2011:085
https://bugzilla.redhat.com/show_bug.cgi?id=695420
https://rhn.redhat.com/errata/RHSA-2011-0477.html
https://www.sec-consult.com/files/20110407-0_libmodplug_stackoverflow.txt
https://www.ubuntu.com/usn/USN-1148-1/
Products affected by CVE-2011-1574
Konstanty Bialkowski
»
Libmodplug
»
Version:
0.8
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8
Konstanty Bialkowski
»
Libmodplug
»
Version:
0.8.4
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.4
Konstanty Bialkowski
»
Libmodplug
»
Version:
0.8.5
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.5
Konstanty Bialkowski
»
Libmodplug
»
Version:
0.8.6
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.6
Konstanty Bialkowski
»
Libmodplug
»
Version:
0.8.7
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.7
Konstanty Bialkowski
»
Libmodplug
»
Version:
0.8.8
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8
Konstanty Bialkowski
»
Libmodplug
»
Version:
0.8.8.1
cpe:2.3:a:konstanty_bialkowski:libmodplug:0.8.8.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved