1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: Simple Open Music Player v1.0 m3u File Buffer Overflow

Attack: Simple Open Music Player v1.0 m3u File Buffer Overflow

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in Simple Open Music Player (S.O.M.P.L) which could result in remote code execution.

Additional Information

Simple Open Music Player (S.O.M.P.L) is a media player for windows.

Simple Open Music Player (S.O.M.P.L) is prone to buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data. Specifically, the application fails to handle specially crafted '.m3u' playlist files.

Attackers can exploit these issues to run arbitrary code with elevated privileges. Failed exploit attempts can result in a denial-of-service condition.

Affected

  • Simple Open Music Player (S.O.M.P.L) v1.0
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube