Buffer overflow in VUPlayer 2.49 and earlier allows user-assisted attackers to execute arbitrary code via a long URL in a File line in a .pls file, as demonstrated by an http URL on a File1 line.
References
Link | Resource |
---|---|
http://securityreason.com/securityalert/4923 | Exploit Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/48170 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/7695 | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/165489/VUPlayer-2.49-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2009-01-20 08:30
Updated : 2022-04-22 11:52
NVD link : CVE-2009-0182
Mitre link : CVE-2009-0182
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
vuplayer
- vuplayer