Critical Vulnerability Information Application OpenMPT (MODPlug Tracker) - http://modplug.sourceforge.net - http://www.modplug.com libmodplug - http://modplug-xmms.sourceforge.net Vulnerability Details Type: Stack and heap overflow CVE ID: CVE-2006-4192 CVSS Score: 5.1/10 - Impact Score: 6.4/10 - Confidentiality Impact: Partial - Integrity Impact: Partial - Availability Impact: Partial - Exploitability Score: 4.9/10 - Attack Complexity: High - Authentication: None required Risk Level: High --- Specific Vulnerabilities Issue A: Global buffer overflow in function - Cause: All text fields in ITP files are not filtered, leading to overflow of global variables and execution of malicious code. Issue B: Heap overflow in function - Cause: Invalid length values cause heap overflow; attackers can control allocation size and manipulate heap data. Affected Platforms Operating System: Windows Other Supported Platforms: nix, BSD, XMMS plugin, etc. Status Disclosure Date: August 9, 2006 Patch Status: New version to be released soon --- Author Reporter: Luigi Auriemma Contact: aluigi (dot) autistici (at) com (email hidden)