Vulnerability Description
WM Downloader version 3.1.2.2 is vulnerable to a buffer overflow when processing a specially crafted .m3u playlist file. The application fails to properly validate input length, allowing an attacker to overwrite structured exception handler (SEH) records and execute arbitrary code. Exploitation occurs locally when a user opens the malicious file, and the payload executes with the privileges of the current user.
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/14497
- https://www.exploit-db.com/exploits/16642
- https://www.fortiguard.com/encyclopedia/ips/24038/wm-downloader-buffer-overflow
- https://www.vulncheck.com/advisories/wm-downloader-buffer-overflow-via-malformed
FAQ
What is CVE-2010-10017?
CVE-2010-10017 is a documented vulnerability. WM Downloader version 3.1.2.2 is vulnerable to a buffer overflow when processing a specially crafted .m3u playlist file. The application fails to properly validate input length, allowing an attacker t...
How severe is CVE-2010-10017?
CVSS scoring is not yet available for CVE-2010-10017. Check NVD for updates.
Is there a patch for CVE-2010-10017?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.