vendor:
Pipl
by:
Steven Seeley aka mr_me
7,8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Pipl
Affected Version From: 2.5.0
Affected Version To: 2.5.0
Patch Exists: YES
Related CWE: N/A
CPE: a:programmed_integration:pipl
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP, Windows Vista
2009
PIPL <= 2.5.0 (.m3u File) Universal bof exploit (SEH)
A buffer overflow vulnerability exists in Pipl 2.5.0, which allows an attacker to execute arbitrary code by sending a specially crafted .m3u file. The vulnerability is due to the application not properly validating the length of user-supplied data before copying it to a fixed-length buffer. An attacker can exploit this vulnerability by sending a malicious .m3u file to the target system, which will trigger a stack-based buffer overflow and allow the attacker to execute arbitrary code on the target system.
Mitigation:
Upgrade to the latest version of Pipl, or apply the appropriate patch from the vendor.