1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: MMPlayer .m3u and .ppl Files Buffer Overflow

Attack: MMPlayer .m3u and .ppl Files Buffer Overflow

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempts to exploit a buffer overflow vulnerability in MMPlayer which could result in remote code execution.

Additional Information

MMPlayer is a multimedia player.

MMPlayer is prone to multiple buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data. Specifically, the application fails to handle specially crafted '.m3u' and '.ppl' playlist files.

Local attackers can exploit these issues to run arbitrary code with elevated privileges. Failed exploit attempts can result in a denial-of-service condition.


  • MMPlayer 2.2 is vulnerable; other versions may also be affected.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube