CVE-2011-1574

libmodplug <0.8.8.2 - Buffer Overflow

Title source: llm

Description

Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/17252
metasploit WORKING POC NORMAL
by jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb

Scores

EPSS 0.6632
EPSS Percentile 98.5%

Details

CWE
CWE-119
Status published
Products (7)
konstanty_bialkowski/libmodplug 0.8
konstanty_bialkowski/libmodplug 0.8.4
konstanty_bialkowski/libmodplug 0.8.5
konstanty_bialkowski/libmodplug 0.8.6
konstanty_bialkowski/libmodplug 0.8.7
konstanty_bialkowski/libmodplug 0.8.8
konstanty_bialkowski/libmodplug < 0.8.8.1
Published May 09, 2011
Tracked Since Feb 18, 2026