Description
Quick Player 1.3 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting a malicious .m3l file with carefully constructed payload. Attackers can trigger the vulnerability by loading a specially crafted file through the application's file loading mechanism, potentially enabling remote code execution.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
Credits
Felipe Winsnes
References
www.exploit-db.com/exploits/48564 (ExploitDB-48564)
download.cnet.com/quick-player/3000-2168_4-10871417.html (Software Download Link)
web.archive.org/....github.io/posts/Exploiting-Quick-Player/ (Archived Researcher Blog Post)
web.archive.org/...0wz.github.io/assets/img/Findings6/18.gif (Archived Researcher Video PoC)
www.vulncheck.com/advisories/quick-player-ml-buffer-overflow (VulnCheck Advisory: Quick Player 1.3 - '.m3l' Buffer Overflow)