Description
BS.Player version 2.57 (build 1051) contains a vulnerability in its playlist import functionality. When processing .m3u files, the application fails to properly validate the length of playlist entries, resulting in a buffer overflow condition. This flaw occurs during parsing of long URLs embedded in the playlist, allowing overwrite of Structured Exception Handler (SEH) records. The vulnerability is triggered upon opening a crafted playlist file and affects the Unicode parsing logic in the Windows client.
Problem types
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
*
Credits
C4SS!0 G0M3S
References
raw.githubusercontent.com/...dows/fileformat/bsplayer_m3u.rb
www.exploit-db.com/exploits/15934
www.exploit-db.com/exploits/18375
www.bsplayer.com/
www.vulncheck.com/...buffer-overflow-via-m3u-playlist-import