Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
992Proxy

Locked BlazeVideo HDTV Player Pro 6.6 Filename Handling


1337day-Exploits

Recommended Posts

PacketStorm-Security Acaba de publicar lo siguiente:

 

This is the hidden content, please
;)

 

This Metasploit module exploits a vulnerability found in BlazeVideo HDTV Player's filename handling routine. When supplying a string of input data embedded in a .plf file, the MediaPlayerCtrl.dll component will try to extract a filename by using PathFindFileNameA(), and then copies whatever the return value is on the stack by using an inline strcpy. As a result, if this input data is long enough, it can cause a stack-based buffer overflow, which may lead to arbitrary code execution under the context of the user.

 

 

11-30-2012 05:29 PM

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.