All the vulnerabilites related to bsplayer - bs.player
cve-2009-1068
Vulnerability from cvelistv5
Published
2009-03-24 19:00
Modified
2024-08-07 04:57
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in BS.Player (bsplayer) 2.32 Build 975 Free and 2.34 Build 980 PRO and earlier allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long hostname in a .bsl playlist file.
References
▼ | URL | Tags |
---|---|---|
http://retrogod.altervista.org/9sg_bsplayer_seh.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49342 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/34412 | third-party-advisory, x_refsource_SECUNIA | |
https://www.exploit-db.com/exploits/8251 | exploit, x_refsource_EXPLOIT-DB | |
http://www.vupen.com/english/advisories/2009/0800 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/502016/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://www.exploit-db.com/exploits/8249 | exploit, x_refsource_EXPLOIT-DB | |
http://osvdb.org/52841 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/34190 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:17.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://retrogod.altervista.org/9sg_bsplayer_seh.html" }, { "name": "bsplayer-bsl-bo(49342)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49342" }, { "name": "34412", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34412" }, { "name": "8251", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/8251" }, { "name": "ADV-2009-0800", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0800" }, { "name": "20090320 Bs.Player \u003c= 2.34 Build 980 (.bsl) local buffer overflow 0day exploit (seh)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/502016/100/0/threaded" }, { "name": "8249", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/8249" }, { "name": "52841", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/52841" }, { "name": "34190", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34190" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in BS.Player (bsplayer) 2.32 Build 975 Free and 2.34 Build 980 PRO and earlier allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long hostname in a .bsl playlist file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://retrogod.altervista.org/9sg_bsplayer_seh.html" }, { "name": "bsplayer-bsl-bo(49342)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49342" }, { "name": "34412", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34412" }, { "name": "8251", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/8251" }, { "name": "ADV-2009-0800", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0800" }, { "name": "20090320 Bs.Player \u003c= 2.34 Build 980 (.bsl) local buffer overflow 0day exploit (seh)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/502016/100/0/threaded" }, { "name": "8249", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/8249" }, { "name": "52841", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/52841" }, { "name": "34190", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34190" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1068", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in BS.Player (bsplayer) 2.32 Build 975 Free and 2.34 Build 980 PRO and earlier allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long hostname in a .bsl playlist file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://retrogod.altervista.org/9sg_bsplayer_seh.html", "refsource": "MISC", "url": "http://retrogod.altervista.org/9sg_bsplayer_seh.html" }, { "name": "bsplayer-bsl-bo(49342)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49342" }, { "name": "34412", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34412" }, { "name": "8251", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/8251" }, { "name": "ADV-2009-0800", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0800" }, { "name": "20090320 Bs.Player \u003c= 2.34 Build 980 (.bsl) local buffer overflow 0day exploit (seh)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/502016/100/0/threaded" }, { "name": "8249", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/8249" }, { "name": "52841", "refsource": "OSVDB", "url": "http://osvdb.org/52841" }, { "name": "34190", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34190" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1068", "datePublished": "2009-03-24T19:00:00", "dateReserved": "2009-03-24T00:00:00", "dateUpdated": "2024-08-07T04:57:17.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-6583
Vulnerability from cvelistv5
Published
2009-04-03 18:00
Modified
2024-08-07 11:34
Severity ?
EPSS score ?
Summary
Buffer overflow in BS.player 2.27 build 959 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .SRT file.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/28811 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/5455 | exploit, x_refsource_EXPLOIT-DB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41841 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2008/1243/references | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:34:47.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28811", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28811" }, { "name": "5455", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5455" }, { "name": "bsplayer-srt-bo(41841)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41841" }, { "name": "ADV-2008-1243", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1243/references" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in BS.player 2.27 build 959 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .SRT file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28811", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28811" }, { "name": "5455", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5455" }, { "name": "bsplayer-srt-bo(41841)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41841" }, { "name": "ADV-2008-1243", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1243/references" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6583", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in BS.player 2.27 build 959 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .SRT file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28811", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28811" }, { "name": "5455", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5455" }, { "name": "bsplayer-srt-bo(41841)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41841" }, { "name": "ADV-2008-1243", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1243/references" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6583", "datePublished": "2009-04-03T18:00:00", "dateReserved": "2009-04-03T00:00:00", "dateUpdated": "2024-08-07T11:34:47.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2009
Vulnerability from cvelistv5
Published
2010-05-21 17:00
Modified
2024-09-16 19:04
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the media library in BS.Global BS.Player 2.51 build 1022, 2.41 build 1003, and possibly other versions allows user-assisted remote attackers to execute arbitrary code via a long ID3 tag in a .MP3 file. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php | x_refsource_MISC | |
http://secunia.com/advisories/38221 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/38568 | vdb-entry, x_refsource_BID | |
http://www.packetstormsecurity.org/1003-advisories/bsplayerml-overflow.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:17:13.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php" }, { "name": "38221", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38221" }, { "name": "38568", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/38568" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.packetstormsecurity.org/1003-advisories/bsplayerml-overflow.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the media library in BS.Global BS.Player 2.51 build 1022, 2.41 build 1003, and possibly other versions allows user-assisted remote attackers to execute arbitrary code via a long ID3 tag in a .MP3 file. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-05-21T17:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php" }, { "name": "38221", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38221" }, { "name": "38568", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/38568" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.packetstormsecurity.org/1003-advisories/bsplayerml-overflow.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the media library in BS.Global BS.Player 2.51 build 1022, 2.41 build 1003, and possibly other versions allows user-assisted remote attackers to execute arbitrary code via a long ID3 tag in a .MP3 file. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php", "refsource": "MISC", "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php" }, { "name": "38221", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38221" }, { "name": "38568", "refsource": "BID", "url": "http://www.securityfocus.com/bid/38568" }, { "name": "http://www.packetstormsecurity.org/1003-advisories/bsplayerml-overflow.txt", "refsource": "MISC", "url": "http://www.packetstormsecurity.org/1003-advisories/bsplayerml-overflow.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2009", "datePublished": "2010-05-21T17:00:00Z", "dateReserved": "2010-05-21T00:00:00Z", "dateUpdated": "2024-09-16T19:04:56.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2004
Vulnerability from cvelistv5
Published
2010-05-20 21:00
Modified
2024-08-07 02:17
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in BS.Global BS.Player 2.51 Build 1022 Free, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via the Skin parameter in the Options section of a skins file (.bsi), a different vulnerability than CVE-2009-1068.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2010/0148 | vdb-entry, x_refsource_VUPEN | |
http://www.mertsarica.com/?p=511 | x_refsource_MISC | |
http://secunia.com/advisories/38221 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mertsarica.com/codes/bsplayer_seh_overwrite.py | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55708 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/37831 | vdb-entry, x_refsource_BID | |
http://www.exploit-db.com/exploits/11154 | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:17:14.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-0148", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0148" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.mertsarica.com/?p=511" }, { "name": "38221", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38221" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.mertsarica.com/codes/bsplayer_seh_overwrite.py" }, { "name": "bsplayer-bsi-bo(55708)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55708" }, { "name": "37831", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37831" }, { "name": "11154", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/11154" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in BS.Global BS.Player 2.51 Build 1022 Free, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via the Skin parameter in the Options section of a skins file (.bsi), a different vulnerability than CVE-2009-1068." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2010-0148", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0148" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.mertsarica.com/?p=511" }, { "name": "38221", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38221" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.mertsarica.com/codes/bsplayer_seh_overwrite.py" }, { "name": "bsplayer-bsi-bo(55708)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55708" }, { "name": "37831", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37831" }, { "name": "11154", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/11154" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-2004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in BS.Global BS.Player 2.51 Build 1022 Free, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via the Skin parameter in the Options section of a skins file (.bsi), a different vulnerability than CVE-2009-1068." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-0148", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0148" }, { "name": "http://www.mertsarica.com/?p=511", "refsource": "MISC", "url": "http://www.mertsarica.com/?p=511" }, { "name": "38221", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38221" }, { "name": "http://www.mertsarica.com/codes/bsplayer_seh_overwrite.py", "refsource": "MISC", "url": "http://www.mertsarica.com/codes/bsplayer_seh_overwrite.py" }, { "name": "bsplayer-bsi-bo(55708)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55708" }, { "name": "37831", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37831" }, { "name": "11154", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/11154" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-2004", "datePublished": "2010-05-20T21:00:00", "dateReserved": "2010-05-20T00:00:00", "dateUpdated": "2024-08-07T02:17:14.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3138
Vulnerability from cvelistv5
Published
2010-08-27 18:10
Modified
2024-08-07 02:55
Severity ?
EPSS score ?
Summary
Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.us-cert.gov/cas/techalerts/TA12-045A.html | third-party-advisory, x_refsource_CERT | |
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php | x_refsource_MISC | |
http://www.exploit-db.com/exploits/14765 | exploit, x_refsource_EXPLOIT-DB | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7132 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2010/2190 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/67588 | vdb-entry, x_refsource_OSVDB | |
http://www.exploit-db.com/exploits/14788 | exploit, x_refsource_EXPLOIT-DB | |
http://secunia.com/advisories/41114 | third-party-advisory, x_refsource_SECUNIA | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014 | vendor-advisory, x_refsource_MS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:55:46.855Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA12-045A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA12-045A.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php" }, { "name": "14765", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/14765" }, { "name": "oval:org.mitre.oval:def:7132", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7132" }, { "name": "ADV-2010-2190", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2190" }, { "name": "67588", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/67588" }, { "name": "14788", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/14788" }, { "name": "41114", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41114" }, { "name": "MS12-014", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-08-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka \"Indeo Codec Insecure Library Loading Vulnerability.\" NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA12-045A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA12-045A.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php" }, { "name": "14765", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/14765" }, { "name": "oval:org.mitre.oval:def:7132", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7132" }, { "name": "ADV-2010-2190", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2190" }, { "name": "67588", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/67588" }, { "name": "14788", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/14788" }, { "name": "41114", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41114" }, { "name": "MS12-014", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka \"Indeo Codec Insecure Library Loading Vulnerability.\" NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA12-045A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA12-045A.html" }, { "name": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php", "refsource": "MISC", "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php" }, { "name": "14765", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/14765" }, { "name": "oval:org.mitre.oval:def:7132", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7132" }, { "name": "ADV-2010-2190", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2190" }, { "name": "67588", "refsource": "OSVDB", "url": "http://osvdb.org/67588" }, { "name": "14788", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/14788" }, { "name": "41114", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41114" }, { "name": "MS12-014", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3138", "datePublished": "2010-08-27T18:10:00", "dateReserved": "2010-08-27T00:00:00", "dateUpdated": "2024-08-07T02:55:46.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2010-08-27 19:00
Modified
2024-11-21 01:18
Severity ?
Summary
Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows_media_player | * | |
microsoft | windows_xp | * | |
bsplayer | bs.player | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:windows_media_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "5044AB3C-7E2F-45F8-8392-7E99FC198787", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bsplayer:bs.player:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC5783BA-71D2-4669-A504-E38BDB2F6402", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka \"Indeo Codec Insecure Library Loading Vulnerability.\" NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Una vulnerabilidad de ruta (path) de b\u00fasqueda no confiable en el C\u00f3dec Indeo en el archivo iac25_32.ax en Microsoft Windows XP SP3, permite a los usuarios locales alcanzar privilegios por medio de un archivo iacenc.dll de tipo caballo de Troya en el directorio de trabajo actual, como es demostrado por el acceso por medio de BS.Player o Media Player Classic a un directorio que contiene un archivo .avi, .mka, .ra o .ram, tambi\u00e9n se conoce como \"Indeo Codec Insecure Library Loading Vulnerability\" NOTA: algunos de estos datos se obtienen de informaci\u00f3n de terceros." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/426.html \r\n\r\n\u0027CWE-426 - \u0027Untrusted Search Path Vulnerability\u0027", "id": "CVE-2010-3138", "lastModified": "2024-11-21T01:18:07.147", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-27T19:00:01.393", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/67588" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41114" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/14765" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/14788" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA12-045A.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2190" }, { "source": "cve@mitre.org", "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/67588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/14765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/14788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA12-045A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4956.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7132" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-26 05:51
Modified
2024-11-21 01:01
Severity ?
Summary
Stack-based buffer overflow in BS.Player (bsplayer) 2.32 Build 975 Free and 2.34 Build 980 PRO and earlier allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long hostname in a .bsl playlist file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bsplayer:bs.player:2.32:free:*:*:*:*:*:*", "matchCriteriaId": "ABD8C3AE-A226-4E46-9F79-7B61A7B957DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bsplayer:bs.player:2.34:pro:*:*:*:*:*:*", "matchCriteriaId": "97551864-DFEB-4F25-A8A8-8644FFA4F2E1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in BS.Player (bsplayer) 2.32 Build 975 Free and 2.34 Build 980 PRO and earlier allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long hostname in a .bsl playlist file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en BS.Player (bsplayer) v2.32 Build 975 Free y v2.34 Build 980 PRO y versiones anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un hostname largo en un fichero de lista de reproducci\u00f3n .bsl." } ], "id": "CVE-2009-1068", "lastModified": "2024-11-21T01:01:35.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-03-26T05:51:52.627", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/52841" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://retrogod.altervista.org/9sg_bsplayer_seh.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34412" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/502016/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34190" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0800" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49342" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/8249" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/8251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/52841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://retrogod.altervista.org/9sg_bsplayer_seh.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/502016/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/8249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/8251" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-20 21:30
Modified
2024-11-21 01:15
Severity ?
Summary
Stack-based buffer overflow in BS.Global BS.Player 2.51 Build 1022 Free, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via the Skin parameter in the Options section of a skins file (.bsi), a different vulnerability than CVE-2009-1068.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bsplayer:bs.player:2.51:-:free:*:*:*:*:*", "matchCriteriaId": "7E72714B-AF32-434E-8F78-23EF28A76811", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in BS.Global BS.Player 2.51 Build 1022 Free, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via the Skin parameter in the Options section of a skins file (.bsi), a different vulnerability than CVE-2009-1068." }, { "lang": "es", "value": "Desbordamiento de b\u00faffer basado en pila de BS.Global BS.Player v2.51 Build 1022 Free y posiblemente otras versiones, permite a atacantes remotos asistidos por el usuario a trav\u00e9s del par\u00e1metro Skin en la secci\u00f3n Options de un fichero \"skins\" (.bsi), vulnerabilidad diferente que CVE-2009-1068.\r\n" } ], "id": "CVE-2010-2004", "lastModified": "2024-11-21T01:15:41.170", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-20T21:30:01.863", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38221" }, { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/11154" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.mertsarica.com/?p=511" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.mertsarica.com/codes/bsplayer_seh_overwrite.py" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/37831" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0148" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/11154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.mertsarica.com/?p=511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.mertsarica.com/codes/bsplayer_seh_overwrite.py" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/37831" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55708" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-05-21 17:30
Modified
2024-11-21 01:15
Severity ?
Summary
Stack-based buffer overflow in the media library in BS.Global BS.Player 2.51 build 1022, 2.41 build 1003, and possibly other versions allows user-assisted remote attackers to execute arbitrary code via a long ID3 tag in a .MP3 file. NOTE: some of these details are obtained from third party information.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bsplayer:bs.player:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "A3095CCA-AC38-42C5-BF5A-C4C1D63B8E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bsplayer:bs.player:2.51:*:*:*:*:*:*:*", "matchCriteriaId": "4684721D-073F-4F2C-B20A-74FA99B701F3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the media library in BS.Global BS.Player 2.51 build 1022, 2.41 build 1003, and possibly other versions allows user-assisted remote attackers to execute arbitrary code via a long ID3 tag in a .MP3 file. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la librer\u00eda multimedia de BS.Global BS.Player v2.51 build 1022, v2.41 build 1003, y posiblemente otras versiones. Permite a atacantes remotos asistidos por el usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un etiqueta extensa ID3 en un fichero .MP3. NOTA: algunos de estos detalles han sido obtenidos de informaci\u00f3n de terceras partes." } ], "id": "CVE-2010-2009", "lastModified": "2024-11-21T01:15:41.973", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-05-21T17:30:01.537", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38221" }, { "source": "cve@mitre.org", "url": "http://www.packetstormsecurity.org/1003-advisories/bsplayerml-overflow.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/38568" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.packetstormsecurity.org/1003-advisories/bsplayerml-overflow.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/38568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4932.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-03 18:30
Modified
2024-11-21 00:56
Severity ?
Summary
Buffer overflow in BS.player 2.27 build 959 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .SRT file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bsplayer:bs.player:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "102DE8A0-2F3B-4F61-BEA3-EA92324B4DA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in BS.player 2.27 build 959 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .SRT file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en BS.player v2.27 build 959 permite a atacantes remotos producir una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de manera arbitraria a trav\u00e9s de una cadena larga en un fichero .SRT." } ], "id": "CVE-2008-6583", "lastModified": "2024-11-21T00:56:54.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-04-03T18:30:00.187", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28811" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1243/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41841" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/28811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1243/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5455" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }