Page 2 of 11 results (0.006 seconds)

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 1

27 Apr 2009 — Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins, TTPlayer, and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow, as exploited in the wild in August 2008. Desbordamiento en la función CSoundFile::ReadMed (src/load_med.cpp) en libmodplug antes de la versión v0.8.6, tal como se utiliza en gstream... • http://bugs.gentoo.org/show_bug.cgi?id=266913 • CWE-189: Numeric Errors •