[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] SEH Local buffer overflow vulnerability
From:       "Arjun Basnet" <arjun () cybersecurityworks ! com>
Date:       2015-08-24 9:56:24
Message-ID: 00ae01d0de51$78dd4a30$6a97de90$ () cybersecurityworks ! com
[Download RAW message or body]


Hello List,

 

Could you please tell if this issue is applicable for CVE?

 

I tried contacting vendor for reporting the issue but due to unavailability
of contact details was unable to do so. Hence I am sending this mail to with
the issue and request for CVE

 

Description:

A very common and awarded serenity audio player(Latest Version) and Malx
media player(Older Version) (
http://malx-media-player.software.informer.com/awards/)  is vulnerable to
buffer overflow vulnerability, An attacker can create a malicious m3u and
running the malicious file through the media player crashes the media player
through an structure exception handling (SEH)  and allows code execution on
that system. This can help the attacker to gain access of the machine. 

 

Affected Versions:

The vulnerabilities was tested on Windows 7 and XP SP2 and other could work
on other version of Windows( not checked). Following version of media player
are vulnerable:

 

Serenity audio Player 3.2.3 

Malx media player 3.2.2 and lower version may also be affected(Not checked)

 

http://malsmith.kyabram.biz/serenity/

 

Discovered by:

 

Arjun Basnet from Cyber Security Works Pvt. Ltd.

 

 

Please feel free to contact me for any additional information.

 

Have a nice day !

=================

Thanks & Regard's

 

Arjun Basnet



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic