CVE-2011-10025
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-08-22
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| subtitle_processor | subtitle_processor | 7.7.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow in Subtitle Processor 7.7.1's .m3u file parser. When a specially crafted playlist file is opened, the application converts the input to Unicode and copies it into a fixed-size stack buffer without proper bounds checking. This allows an attacker to overwrite the Structured Exception Handler (SEH) and execute arbitrary code.
How can this vulnerability impact me? :
An attacker can exploit this vulnerability to execute arbitrary code on the affected system, potentially gaining control over the application or system. This could lead to unauthorized actions, data compromise, or system instability.