ID CVE-2006-3879
Summary Integer overflow in the loadChunk function in loaders/load_gt2.c in libmikmod in Mikmod Sound System 3.2.2 allows remote attackers to cause a denial of service via a GRAOUMF TRACKER (GT2) module file with a large (0xffffffff) comment length value in an XCOM chunk.
References
Vulnerable Configurations
  • cpe:2.3:a:miod_vallat:mikmod:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:miod_vallat:mikmod:3.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:miod_vallat:mikmod:3.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:miod_vallat:mikmod:3.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:miod_vallat:mikmod:3.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:miod_vallat:mikmod:3.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:miod_vallat:mikmod:3.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:miod_vallat:mikmod:3.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:miod_vallat:mikmod:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:miod_vallat:mikmod:3.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:miod_vallat:mikmod:3.2.2:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 17-10-2018 - 21:32)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 19134
bugtraq 20060724 Heap overflow in the GT2 loader of libmikmod 3.2.2
misc
secunia 21196
sreason 1288
vupen ADV-2006-2967
statements via4
contributor Mark J Cox
lastmodified 2006-08-16
organization Red Hat
statement This issue does not affect versions of Mikmod 3.2.0-beta2 or prior. Versions of Mikmod distributed with Red Hat Enterprise Linux 2.1, 3, and 4 are based on version 3.1.11 and are therefore not vulnerable to this issue.
Last major update 17-10-2018 - 21:32
Published 27-07-2006 - 01:04
Back to Top