ID |
CVE-2006-3879
|
Summary |
Integer overflow in the loadChunk function in loaders/load_gt2.c in libmikmod in Mikmod Sound System 3.2.2 allows remote attackers to cause a denial of service via a GRAOUMF TRACKER (GT2) module file with a large (0xffffffff) comment length value in an XCOM chunk. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:miod_vallat:mikmod:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.0.3:*:*:*:*:*:*:*
-
cpe:2.3:a:miod_vallat:mikmod:3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.1.6:*:*:*:*:*:*:*
-
cpe:2.3:a:miod_vallat:mikmod:3.1.7:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.1.7:*:*:*:*:*:*:*
-
cpe:2.3:a:miod_vallat:mikmod:3.1.8:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.1.8:*:*:*:*:*:*:*
-
cpe:2.3:a:miod_vallat:mikmod:3.1.9:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.1.9:*:*:*:*:*:*:*
-
cpe:2.3:a:miod_vallat:mikmod:3.1.10:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.1.10:*:*:*:*:*:*:*
-
cpe:2.3:a:miod_vallat:mikmod:3.1.11:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.1.11:*:*:*:*:*:*:*
-
cpe:2.3:a:miod_vallat:mikmod:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.2.0:*:*:*:*:*:*:*
-
cpe:2.3:a:miod_vallat:mikmod:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.2.1:*:*:*:*:*:*:*
-
cpe:2.3:a:miod_vallat:mikmod:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:miod_vallat:mikmod:3.2.2:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 17-10-2018 - 21:32) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-189 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
refmap
via4
|
bid | 19134 | bugtraq | 20060724 Heap overflow in the GT2 loader of libmikmod 3.2.2 | misc | | secunia | 21196 | sreason | 1288 | vupen | ADV-2006-2967 |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2006-08-16 | organization | Red Hat | statement | This issue does not affect versions of Mikmod 3.2.0-beta2 or prior. Versions of Mikmod distributed with Red Hat Enterprise Linux 2.1, 3, and 4 are based on version 3.1.11 and are therefore not vulnerable to this issue. |
|
Last major update |
17-10-2018 - 21:32 |
Published |
27-07-2006 - 01:04 |
Last modified |
17-10-2018 - 21:32 |