#VU108912 Stack-based buffer overflow in libxmp - CVE-2013-1980
Published: May 12, 2025
libxmp
Libxmp
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the get_dsmp() function in loaders/masi_load.c. A remote attacker can pass a specially crafted MASI file to the application, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://sourceforge.net/p/xmp/libxmp/ci/a015fdfb478a60172fd225632a11bbd02870fc40
- http://sourceforge.net/projects/xmp/files/libxmp/4.1.0/Changelog/view
- http://www.openwall.com/lists/oss-security/2013/04/22/12
- https://bugzilla.redhat.com/show_bug.cgi?id=954658
- https://build.opensuse.org/request/show/174356