ID CVE-2007-6720
Summary libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.
References
Vulnerable Configurations
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.9-1
    cpe:2.3:a:igno_saitz:libmikmod:3.1.9-1
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.9-2
    cpe:2.3:a:igno_saitz:libmikmod:3.1.9-2
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.9-3
    cpe:2.3:a:igno_saitz:libmikmod:3.1.9-3
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.9-4
    cpe:2.3:a:igno_saitz:libmikmod:3.1.9-4
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.9-5
    cpe:2.3:a:igno_saitz:libmikmod:3.1.9-5
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.9-6
    cpe:2.3:a:igno_saitz:libmikmod:3.1.9-6
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.10-1
    cpe:2.3:a:igno_saitz:libmikmod:3.1.10-1
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.10-2
    cpe:2.3:a:igno_saitz:libmikmod:3.1.10-2
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.10-3
    cpe:2.3:a:igno_saitz:libmikmod:3.1.10-3
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.10-4
    cpe:2.3:a:igno_saitz:libmikmod:3.1.10-4
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.10-5
    cpe:2.3:a:igno_saitz:libmikmod:3.1.10-5
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.11-1
    cpe:2.3:a:igno_saitz:libmikmod:3.1.11-1
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.11-2
    cpe:2.3:a:igno_saitz:libmikmod:3.1.11-2
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.11-3
    cpe:2.3:a:igno_saitz:libmikmod:3.1.11-3
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.11-4
    cpe:2.3:a:igno_saitz:libmikmod:3.1.11-4
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.11-5
    cpe:2.3:a:igno_saitz:libmikmod:3.1.11-5
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.11-6
    cpe:2.3:a:igno_saitz:libmikmod:3.1.11-6
  • cpe:2.3:a:igno_saitz:libmikmod:3.1.12
    cpe:2.3:a:igno_saitz:libmikmod:3.1.12
  • cpe:2.3:a:igno_saitz:libmikmod:3.2.0
    cpe:2.3:a:igno_saitz:libmikmod:3.2.0
CVSS
Base: 4.3 (as of 15-11-2016 - 13:56)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2009-272.NASL
    description Multiple vulnerabilities has been found and corrected in libmikmod : libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels (CVE-2007-6720). libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file (CVE-2009-0179). This update fixes these vulnerabilities. Update : Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 42097
    published 2009-10-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=42097
    title Mandriva Linux Security Advisory : libmikmod (MDVSA-2009:272-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-9112.NASL
    description - Fri Aug 28 2009 Jindrich Novy 3.2.0-5.beta2 - fix CVE-2007-6720 (#479829) - fix CVE-2009-0179 (#479833) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-05-11
    plugin id 40810
    published 2009-08-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40810
    title Fedora 11 : libmikmod-3.2.0-5.beta2.fc11 (2009-9112)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20100928_MIKMOD_ON_SL3_X.NASL
    description Multiple input validation flaws, resulting in buffer overflows, were discovered in MikMod. Specially crafted music files in various formats could, when played, cause an application using the MikMod library to crash or, potentially, execute arbitrary code. (CVE-2009-3995, CVE-2009-3996, CVE-2007-6720) All running applications using the MikMod library must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 60860
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=60860
    title Scientific Linux Security Update : mikmod on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-995-1.NASL
    description It was discovered that libMikMod incorrectly handled songs with different channel counts. If a user were tricked into opening a crafted song file, an attacker could cause a denial of service. (CVE-2007-6720) It was discovered that libMikMod incorrectly handled certain malformed XM files. If a user were tricked into opening a crafted XM file, an attacker could cause a denial of service. (CVE-2009-0179) It was discovered that libMikMod incorrectly handled certain malformed Impulse Tracker files. If a user were tricked into opening a crafted Impulse Tracker file, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-3995, CVE-2010-2546, CVE-2010-2971) It was discovered that libMikMod incorrectly handled certain malformed Ultratracker files. If a user were tricked into opening a crafted Ultratracker file, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-3996). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 49764
    published 2010-10-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49764
    title Ubuntu 8.04 LTS / 9.04 / 9.10 : libmikmod vulnerabilities (USN-995-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-9095.NASL
    description - Fri Aug 28 2009 Jindrich Novy 3.2.0-4.beta2 - fix CVE-2007-6720 (#479829) - fix CVE-2009-0179 (#479833) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2016-05-11
    plugin id 40809
    published 2009-08-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40809
    title Fedora 10 : libmikmod-3.2.0-4.beta2.fc10 (2009-9095)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_LIBMIKMOD-090227.NASL
    description Specially crafted XM files or playing mod files with varying number of channels could crash applications using libmikmod (CVE-2009-0179, CVE-2007-6720).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 40257
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40257
    title openSUSE Security Update : libmikmod (libmikmod-570)
  • NASL family SuSE Local Security Checks
    NASL id SUSE9_12359.NASL
    description Specially crafted XM files or playing mod files with varying number of channels could crash applications using libmikmod. (CVE-2009-0179, CVE-2007-6720)
    last seen 2019-02-21
    modified 2012-04-23
    plugin id 41282
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41282
    title SuSE9 Security Update : libmikmod (YOU Patch Number 12359)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBMIKMOD-6034.NASL
    description Specially crafted XM files or playing mod files with varying number of channels could crash applications using libmikmod. (CVE-2009-0179 / CVE-2007-6720)
    last seen 2019-02-21
    modified 2012-05-17
    plugin id 41545
    published 2009-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=41545
    title SuSE 10 Security Update : libmikmod (ZYPP Patch Number 6034)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_0_LIBMIKMOD-090227.NASL
    description Specially crafted XM files or playing mod files with varying number of channels could crash applications using libmikmod (CVE-2009-0179, CVE-2007-6720).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 40025
    published 2009-07-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40025
    title openSUSE Security Update : libmikmod (libmikmod-570)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_LIBMIKMOD-6033.NASL
    description Specially crafted XM files or playing mod files with varying number of channels could crash applications using libmikmod (CVE-2009-0179, CVE-2007-6720).
    last seen 2019-02-21
    modified 2014-06-13
    plugin id 35759
    published 2009-03-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35759
    title openSUSE 10 Security Update : libmikmod (libmikmod-6033)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2010-0720.NASL
    description From Red Hat Security Advisory 2010:0720 : Updated mikmod packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MikMod is a MOD music file player for Linux, UNIX, and similar operating systems. It supports various file formats including MOD, STM, S3M, MTM, XM, ULT, and IT. Multiple input validation flaws, resulting in buffer overflows, were discovered in MikMod. Specially crafted music files in various formats could, when played, cause an application using the MikMod library to crash or, potentially, execute arbitrary code. (CVE-2009-3995, CVE-2009-3996, CVE-2007-6720) All MikMod users should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using the MikMod library must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2016-12-07
    plugin id 68105
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68105
    title Oracle Linux 3 / 4 / 5 : mikmod (ELSA-2010-0720)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2010-0720.NASL
    description Updated mikmod packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MikMod is a MOD music file player for Linux, UNIX, and similar operating systems. It supports various file formats including MOD, STM, S3M, MTM, XM, ULT, and IT. Multiple input validation flaws, resulting in buffer overflows, were discovered in MikMod. Specially crafted music files in various formats could, when played, cause an application using the MikMod library to crash or, potentially, execute arbitrary code. (CVE-2009-3995, CVE-2009-3996, CVE-2007-6720) All MikMod users should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using the MikMod library must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 49745
    published 2010-10-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49745
    title RHEL 3 / 4 / 5 : mikmod (RHSA-2010:0720)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2010-0720.NASL
    description Updated mikmod packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. MikMod is a MOD music file player for Linux, UNIX, and similar operating systems. It supports various file formats including MOD, STM, S3M, MTM, XM, ULT, and IT. Multiple input validation flaws, resulting in buffer overflows, were discovered in MikMod. Specially crafted music files in various formats could, when played, cause an application using the MikMod library to crash or, potentially, execute arbitrary code. (CVE-2009-3995, CVE-2009-3996, CVE-2007-6720) All MikMod users should upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using the MikMod library must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 49714
    published 2010-10-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49714
    title CentOS 3 / 4 / 5 : mikmod (CESA-2010:0720)
redhat via4
rpms
  • mikmod-0:3.1.6-23.el3
  • mikmod-devel-0:3.1.6-23.el3
  • mikmod-0:3.1.6-33.el4_8.1
  • mikmod-devel-0:3.1.6-33.el4_8.1
  • mikmod-0:3.1.6-39.el5_5.1
  • mikmod-devel-0:3.1.6-39.el5_5.1
refmap via4
bid 33235
confirm
fedora
  • FEDORA-2009-9095
  • FEDORA-2009-9112
misc http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461519
mlist [oss-security] 20090113 CVE Request -- libmikmod
secunia 34259
suse SUSE-SR:2009:006
statements via4
contributor Tomas Hoger
lastmodified 2009-01-21
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-6720 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
Last major update 03-10-2016 - 21:59
Published 20-01-2009 - 11:30
Back to Top