-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2009:128-1 http://www.mandriva.com/security/ _______________________________________________________________________ Package : libmodplug Date : December 3, 2009 Affected: 2008.0 _______________________________________________________________________ Problem Description: Multiple security vulnerabilities has been identified and fixed in libmodplug: Integer overflow in the CSoundFile::ReadMed function (src/load_med.cpp) in libmodplug before 0.8.6, as used in gstreamer-plugins and other products, allows context-dependent attackers to execute arbitrary code via a MED file with a crafted (1) song comment or (2) song name, which triggers a heap-based buffer overflow (CVE-2009-1438). Buffer overflow in the PATinst function in src/load_pat.cpp in libmodplug before 0.8.7 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long instrument name (CVE-2009-1513). The updated packages have been patched to prevent this. Update: Packages for 2008.0 are being provided due to extended support for Corporate products. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1438 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1513 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: 9d7e4ce45987f8103e6e68ff6a789afa 2008.0/i586/libmodplug0-0.8.4-1.1mdv2008.0.i586.rpm 65ca878fccad537bd0dcc8e7b6156d3a 2008.0/i586/libmodplug0-devel-0.8.4-1.1mdv2008.0.i586.rpm 496719add48603cf87e3a27025b5dabb 2008.0/SRPMS/libmodplug-0.8.4-1.1mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: 4e456e05bc59c08a0a0adaf7a2ccce37 2008.0/x86_64/lib64modplug0-0.8.4-1.1mdv2008.0.x86_64.rpm 389e7edbacb029bcd9afef7cf4a9ba0e 2008.0/x86_64/lib64modplug0-devel-0.8.4-1.1mdv2008.0.x86_64.rpm 496719add48603cf87e3a27025b5dabb 2008.0/SRPMS/libmodplug-0.8.4-1.1mdv2008.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLGAw1mqjQ0CJFipgRArw1AJ41+1ZC03JlLV0BIC9hVLI4w/SjWACgyafO xS9rR8i92aZtwqzfYVcDqsA= =eXl+ -----END PGP SIGNATURE-----