Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file. NOTE: some of these details are obtained from third party information.
http://www.openwall.com/lists/oss-security/2011/05/02/19
http://www.openwall.com/lists/oss-security/2011/05/02/1
http://www.exploit-db.com/exploits/17222
http://www.debian.org/security/2012/dsa-2415
http://ubuntu.com/usn/usn-1148-1
http://secunia.com/advisories/48058
http://secunia.com/advisories/45742
http://secunia.com/advisories/44870
http://secunia.com/advisories/44695
http://secunia.com/advisories/44388
http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060520.html