Ubuntu USN-771-1 (libmodplug)

Summary
The remote host is missing an update to libmodplug announced via advisory USN-771-1.
Solution
The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: libmodplug0c2 1:0.7-5ubuntu0.6.06.2 Ubuntu 8.04 LTS: libmodplug0c2 1:0.7-7ubuntu0.8.04.1 Ubuntu 8.10: libmodplug0c2 1:0.7-7ubuntu0.8.10.1 Ubuntu 9.04: libmodplug0c2 1:0.8.4-3ubuntu1.1 In general, a standard system upgrade is sufficient to effect the necessary changes. https://secure1.securityspace.com/smysecure/catid.html?in=USN-771-1
Insight
It was discovered that libmodplug did not correctly handle certain parameters when parsing MED media files. If a user or automated system were tricked into opening a crafted MED file, an attacker could execute arbitrary code with privileges of the user invoking the program. (CVE-2009-1438) Manfred Tremmel and Stanislav Brabec discovered that libmodplug did not correctly handle long instrument names when parsing PAT sample files. If a user or automated system were tricked into opening a crafted PAT file, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. This issue only affected Ubuntu 9.04. (CVE-2009-1438)