CVE-2011-1574
libmodplug <0.8.8.2 - Buffer Overflow
Title source: llmDescription
Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/17252
metasploit
WORKING POC
NORMAL
by jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/vlc_modplug_s3m.rb
References (15)
Scores
EPSS
0.6632
EPSS Percentile
98.5%
Details
CWE
CWE-119
Status
published
Products (7)
konstanty_bialkowski/libmodplug
0.8
konstanty_bialkowski/libmodplug
0.8.4
konstanty_bialkowski/libmodplug
0.8.5
konstanty_bialkowski/libmodplug
0.8.6
konstanty_bialkowski/libmodplug
0.8.7
konstanty_bialkowski/libmodplug
0.8.8
konstanty_bialkowski/libmodplug
< 0.8.8.1
Published
May 09, 2011
Tracked Since
Feb 18, 2026