CVE-2010-10016
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-30

Last updated on: 2025-09-02

Assigner: VulnCheck

Description
BS.Player version 2.57 (build 1051) contains a vulnerability in its playlist import functionality. When processing .m3u files, the application fails to properly validate the length of playlist entries, resulting in a buffer overflow condition. This flaw occurs during parsing of long URLs embedded in the playlist, allowing overwrite of Structured Exception Handler (SEH) records. The vulnerability is triggered upon opening a crafted playlist file and affects the Unicode parsing logic in the Windows client.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-30
Last Modified
2025-09-02
Generated
2026-05-07
AI Q&A
2025-08-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bsplayer bs.player 2.57
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2010-10016 is a critical buffer overflow vulnerability in BS.Player version 2.57 (build 1051) that occurs during the import of specially crafted M3U playlist files. The application fails to properly validate the length of playlist entries, specifically long URLs, which leads to a buffer overflow condition. This overflow allows an attacker to overwrite Structured Exception Handler (SEH) records in the Windows client, enabling arbitrary code execution. The exploit uses a Unicode SEH overwrite technique and targets Windows XP and Windows 7 systems running the vulnerable BS.Player version. The vulnerability can be triggered by opening a maliciously crafted playlist file. [1, 2, 3, 4]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including remote code execution on the affected system without requiring authentication or user interaction. An attacker who can provide a crafted M3U playlist file can exploit the buffer overflow to execute arbitrary code with the privileges of the user running BS.Player. This can lead to full compromise of the system, including confidentiality, integrity, and availability impacts. The exploit can launch payloads such as reverse shells or arbitrary commands, potentially allowing attackers to take control of the affected machine. [1, 2, 3, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying the presence of BS.Player version 2.57 (build 1051) on Windows systems and monitoring for the import or opening of specially crafted .m3u playlist files containing overly long URLs that trigger the buffer overflow. Detection can involve scanning for BS.Player installations and checking for suspicious .m3u files. Since the exploit involves opening a crafted playlist file, monitoring file access or execution of BS.Player with unusual playlist files may help. Specific commands are not provided in the resources, but you can check for the BS.Player version by querying installed programs or running the executable with version flags if available. Additionally, monitoring network traffic for .m3u file transfers or scanning file systems for suspicious .m3u files with abnormally long URLs could be useful. [1, 2, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Avoid opening untrusted or suspicious .m3u playlist files in BS.Player version 2.57. 2) Remove or update BS.Player to a version that is not vulnerable if available. 3) Restrict user permissions to prevent execution of untrusted files. 4) Employ application whitelisting or sandboxing to limit the impact of exploitation. 5) Monitor and block network traffic that may deliver malicious .m3u files. Since the vulnerability is triggered by importing crafted playlist files, preventing the use of such files or upgrading the software are key mitigations. [1, 2, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart