Description
Subtitle Processor 7.7.1 contains a buffer overflow vulnerability in its .m3u file parser. When a crafted playlist file is opened, the application converts input to Unicode and copies it to a fixed-size stack buffer without proper bounds checking. This allows an attacker to overwrite the Structured Exception Handler (SEH) and execute arbitrary code.
Problem types
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
*
Credits
Brandon Murphy
References
www.fortiguard.com/encyclopedia/ips/26849
raw.githubusercontent.com/...t/subtitle_processor_m3u_bof.rb
www.exploit-db.com/exploits/17217
www.exploit-db.com/exploits/17225
sourceforge.net/projects/subtitleproc/
www.vulncheck.com/...ocessor-m3u-seh-unicode-buffer-overflow