Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.900443
Kategorie:Denial of Service
Titel:MikMod Module Player Denial of Service Vulnerability - Linux
Zusammenfassung:MikMod Module Player is prone to a Denial of Service vulnerability.
Beschreibung:Summary:
MikMod Module Player is prone to a Denial of Service vulnerability.

Vulnerability Insight:
The following issues exist:

- libmikmod library using a global variable to keep track of the number of
channels can be exploited to crash an application using the library by
loading a module with more channels than the currently playing module.

- Error when processing the header of certain XM files which can be
exploited to crash an application using the library via a specially
crafted XM file.

Vulnerability Impact:
Successful exploitation will let the attacker crash the application to cause
denial-of-service condition.

Affected Software/OS:
MikMod Module Player version 3.1.11 to 3.2.0 on Linux.

Solution:
Updates are available. Please see the references for more information.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-0179
BugTraq ID: 33240
http://www.securityfocus.com/bid/33240
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339
http://openwall.com/lists/oss-security/2009/01/13/2
http://secunia.com/advisories/34259
SuSE Security Announcement: SUSE-SR:2009:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
CopyrightCopyright (C) 2009 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.