Files
cve/2011/CVE-2011-10008.md

20 lines
1.3 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2011-10008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-10008)
![](https://img.shields.io/static/v1?label=Product&message=MPlayer%20Lite&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=r33064%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%20Stack-based%20Buffer%20Overflow&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen)
### Description
A stack-based buffer overflow vulnerability exists in MPlayer Lite r33064 due to improper bounds checking when handling M3U playlist files containing long http:// URL entries. An attacker can craft a malicious .m3u file with a specially formatted URL that triggers a stack overflow when processed by the player, particularly via drag-and-drop interaction. This flaw allows for control of the execution flow through SEH overwrite and a DEP bypass using a ROP chain that leverages known gadgets in loaded DLLs. Successful exploitation may result in arbitrary code execution with the privileges of the current user.
### POC
#### Reference
- https://www.exploit-db.com/exploits/17013
- https://www.vulncheck.com/advisories/mplayer-lite-r33064-m3u-stack-based-buffer-overflow
#### Github
- https://github.com/ARPSyndicate/cve-scores