{"id":"CVE-2006-3582","details":"Multiple heap-based buffer overflows in Audacious AdPlug 2.0 and earlier allow remote user-assisted attackers to execute arbitrary code via the size specified in the package header of (1) CFF, (2) MTK, (3) DMO, and (4) U6M files.","modified":"2026-04-10T03:38:30.894651Z","published":"2006-07-13T19:05:00Z","references":[{"type":"ADVISORY","url":"http://aluigi.altervista.org/adv/adplugbof-adv.txt"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20972"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21238"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21295"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21869"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200607-13.xml"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200609-06.xml"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/2697"},{"type":"EVIDENCE","url":"http://aluigi.altervista.org/adv/adplugbof-adv.txt"},{"type":"EVIDENCE","url":"http://www.securityfocus.com/bid/18859"},{"type":"FIX","url":"http://secunia.com/advisories/20972"},{"type":"WEB","url":"http://adplug.cvs.sourceforge.net/adplug/adplug/src/cff.cpp?r1=1.16&r2=1.17"},{"type":"WEB","url":"http://www.osvdb.org/27042"},{"type":"WEB","url":"http://www.osvdb.org/27043"},{"type":"WEB","url":"http://www.osvdb.org/27044"},{"type":"WEB","url":"http://www.osvdb.org/27047"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/439432/100/100/threaded"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27670"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27677"}],"schema_version":"1.7.5"}