CVE-2010-10016
BaseFortify
Publication date: 2025-08-30
Last updated on: 2025-09-02
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bsplayer | bs.player | 2.57 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2010-10016 is a critical buffer overflow vulnerability in BS.Player version 2.57 (build 1051) that occurs during the import of specially crafted M3U playlist files. The application fails to properly validate the length of playlist entries, specifically long URLs, which leads to a buffer overflow condition. This overflow allows an attacker to overwrite Structured Exception Handler (SEH) records in the Windows client, enabling arbitrary code execution. The exploit uses a Unicode SEH overwrite technique and targets Windows XP and Windows 7 systems running the vulnerable BS.Player version. The vulnerability can be triggered by opening a maliciously crafted playlist file. [1, 2, 3, 4]
How can this vulnerability impact me? :
This vulnerability can have severe impacts including remote code execution on the affected system without requiring authentication or user interaction. An attacker who can provide a crafted M3U playlist file can exploit the buffer overflow to execute arbitrary code with the privileges of the user running BS.Player. This can lead to full compromise of the system, including confidentiality, integrity, and availability impacts. The exploit can launch payloads such as reverse shells or arbitrary commands, potentially allowing attackers to take control of the affected machine. [1, 2, 3, 4]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by identifying the presence of BS.Player version 2.57 (build 1051) on Windows systems and monitoring for the import or opening of specially crafted .m3u playlist files containing overly long URLs that trigger the buffer overflow. Detection can involve scanning for BS.Player installations and checking for suspicious .m3u files. Since the exploit involves opening a crafted playlist file, monitoring file access or execution of BS.Player with unusual playlist files may help. Specific commands are not provided in the resources, but you can check for the BS.Player version by querying installed programs or running the executable with version flags if available. Additionally, monitoring network traffic for .m3u file transfers or scanning file systems for suspicious .m3u files with abnormally long URLs could be useful. [1, 2, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Avoid opening untrusted or suspicious .m3u playlist files in BS.Player version 2.57. 2) Remove or update BS.Player to a version that is not vulnerable if available. 3) Restrict user permissions to prevent execution of untrusted files. 4) Employ application whitelisting or sandboxing to limit the impact of exploitation. 5) Monitor and block network traffic that may deliver malicious .m3u files. Since the vulnerability is triggered by importing crafted playlist files, preventing the use of such files or upgrading the software are key mitigations. [1, 2, 4]