Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1574
Reference(s):
- CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622091
- CONFIRM:http://modplug-xmms.git.sourceforge.net/git/gitweb.cgi?p=modplug-xmms/modplug-xmms;a=commit;h=aecef259828a89bb00c2e6f78e89de7363b2237b
- CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=695420
- DEBIAN:DSA-2226
- URL: http://www.debian.org/security/2011/dsa-2226