cpe:/a:konstanty_bialkowski:libmodplug:0.8 cpe:/a:konstanty_bialkowski:libmodplug:0.8.4 cpe:/a:konstanty_bialkowski:libmodplug:0.8.5 cpe:/a:konstanty_bialkowski:libmodplug:0.8.6 cpe:/a:konstanty_bialkowski:libmodplug:0.8.7 cpe:/a:konstanty_bialkowski:libmodplug:0.8.8 cpe:/a:konstanty_bialkowski:libmodplug:0.8.8.1 cpe:/a:konstanty_bialkowski:libmodplug:0.8.8.2 CVE-2011-1761 2012-06-07T15:55:02.883-04:00 2013-09-10T02:20:56.120-04:00 6.8 NETWORK MEDIUM NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2012-06-08T08:50:00.000-04:00 EXPLOIT-DB 17222 SECUNIA 44388 SECUNIA 44695 SECUNIA 44870 SECUNIA 45742 SECUNIA 48058 OSVDB 72157 DEBIAN DSA-2415 UBUNTU USN-1148-1 MLIST [oss-security] 20120502 CVE request: libmodplugin stack-buffer overflow MLIST [oss-security] 20120502 Re: CVE request: libmodplugin stack-buffer overflow SUSE openSUSE-SU-2011:0551 SUSE openSUSE-SU-2011:0943 Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.