Vulnerability Description
Stack-based buffer overflow in GOM Player 2.1.33.5071 allows user-assisted remote attackers to execute arbitrary code via a .ASX file with a long URI in the "ref href" tag. NOTE: this issue exists because of a CVE-2007-0707 regression.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gomlab | Gom Player | 2.1.33.5071 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/47009Vendor Advisory
- http://www.exploit-db.com/exploits/18174/
- http://www.osvdb.org/33080
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71575
- http://secunia.com/advisories/47009Vendor Advisory
- http://www.exploit-db.com/exploits/18174/
- http://www.osvdb.org/33080
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71575
FAQ
What is CVE-2011-5162?
CVE-2011-5162 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in GOM Player 2.1.33.5071 allows user-assisted remote attackers to execute arbitrary code via a .ASX file with a long URI in the "ref href" tag. NOTE: this issue exists be...
How severe is CVE-2011-5162?
CVE-2011-5162 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-5162?
Check the references section above for vendor advisories and patch information. Affected products include: Gomlab Gom Player.