1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Web Attack: VUPlayer Cue File

Web Attack: VUPlayer Cue File

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer-overflow vulnerability in the VUPlayer.

Additional Information

VUPlayer is a media player for Microsoft Windows.

VUPlayer is prone to a buffer-overflow vulnerability because it fails to perform adequate checks on user-supplied input. Specifically, the issue occurs when parsing a specially crafted '.cue' metadata file.

Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

VUPlayer 2.49 is vulnerable; other versions may also be affected.

Affected

  • NA

Response

Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube