Vulnerability Description
Stack-based buffer overflow in Mini-Stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long entry in a .pls file.
CVSS Score
9.3
HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mini-Stream | Ripper | 3.0.1.1 |
Related Weaknesses (CWE)
References
- http://www.exploit-db.com/exploits/10745Exploit
- http://www.exploit-db.com/exploits/10747Exploit
- http://www.exploit-db.com/exploits/10782Exploit
- http://www.exploit-db.com/exploits/18082Exploit
- http://www.osvdb.org/61341
- http://www.exploit-db.com/exploits/10745Exploit
- http://www.exploit-db.com/exploits/10747Exploit
- http://www.exploit-db.com/exploits/10782Exploit
- http://www.exploit-db.com/exploits/18082Exploit
- http://www.osvdb.org/61341
FAQ
What is CVE-2009-5109?
CVE-2009-5109 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in Mini-Stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long entry in a .pls file.
How severe is CVE-2009-5109?
CVE-2009-5109 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-5109?
Check the references section above for vendor advisories and patch information. Affected products include: Mini-Stream Ripper.