7.5
CVSSv2

CVE-2006-6251

Published: 04/12/2006 Updated: 19/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in VUPlayer 2.44 and previous versions allows remote malicious users to execute arbitrary code via a long string in an M3U file, aka an "M3U UNC Name" attack.

Vulnerable Product Search on Vulmon Subscribe to Product

vuplayer vuplayer

Exploits

VUPlayer version 249 M3U playlist file remote buffer overflow exploit Shellcode spawns calcexe ...
## # $Id: vuplayer_m3urb 10998 2010-11-11 22:43:22Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Me ...
/* _______ ________ __ _____ __ ___ __\ _ \ ____ \_____ \ | |__ / | | ____ | | __ \ \/ / /_\ \ / \ _(__ < ______ | | \ / | |__/ ___\| |/ / > <\ \_/ \ | \/ \ /_____/ | Y \/ ^ /\ \___| < /__/\_ \\_____ /___| /______ / ...
require 'msf/core' module Msf class Exploits::Windows::Browser::VUPlayer_M3U < Msf::Exploit::Remote include Exploit::Remote::HttpServer::Html def initialize(info = {}) super(update_info(info, 'Name' => 'VUPlayer <= 244 M3U UNC Name Buffer Overflow', 'Description' => %q{ This module exploits a stack overfl ...