Vulnerability Description
Buffer overflow in VUPlayer 2.49 and earlier allows user-assisted attackers to execute arbitrary code via a long URL in a File line in a .pls file, as demonstrated by an http URL on a File1 line.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vuplayer | Vuplayer | <= 2.49 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/165489/VUPlayer-2.49-Buffer-Overflow.htmlExploitThird Party AdvisoryVDB Entry
- http://securityreason.com/securityalert/4923ExploitThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48170Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/7695ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/165489/VUPlayer-2.49-Buffer-Overflow.htmlExploitThird Party AdvisoryVDB Entry
- http://securityreason.com/securityalert/4923ExploitThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48170Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/7695ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2009-0182?
CVE-2009-0182 is a vulnerability with a CVSS score of 8.8 (HIGH). Buffer overflow in VUPlayer 2.49 and earlier allows user-assisted attackers to execute arbitrary code via a long URL in a File line in a .pls file, as demonstrated by an http URL on a File1 line.
How severe is CVE-2009-0182?
CVE-2009-0182 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0182?
Check the references section above for vendor advisories and patch information. Affected products include: Vuplayer Vuplayer.