Buffer overflow in VUPlayer 2.49 and earlier allows user-assisted attackers to execute arbitrary code via a long URL in a File line in a .pls file, as demonstrated by an http URL on a File1 line.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165489/VUPlayer-2.49-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry |
http://securityreason.com/securityalert/4923 | Exploit Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/48170 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/7695 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2009-01-20 16:30
Updated : 2022-04-22 18:52
NVD link : CVE-2009-0182
Mitre link : CVE-2009-0182
CVE.ORG link : CVE-2009-0182
JSON object : View
Products Affected
vuplayer
- vuplayer
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')