CVE-2019-25571
Buffer Overflow in MediaMonkey 4.1.23 Causes Denial of Service
Publication date: 2026-03-21
Last updated on: 2026-03-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ventismedia | mediamonkey | 4.1.23.1881 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-226 | The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2019-25571 is a denial of service (DoS) vulnerability in MediaMonkey version 4.1.23. It occurs when a local attacker opens a specially crafted MP3 file that contains an excessively long URL string. This URL string includes a buffer of about 4000 bytes appended to a URL, which causes the application to crash when opened through the File > Open URL dialog.
The vulnerability is triggered by a buffer overflow caused by the long URL embedded in the MP3 file, leading to application instability or crash.
How can this vulnerability impact me? :
This vulnerability can impact you by causing MediaMonkey to crash unexpectedly when opening a maliciously crafted MP3 file with a long URL string. This results in a denial of service, making the application unavailable or unstable.
Since the attack requires local access and no special privileges or user interaction, an attacker with local access can disrupt your use of MediaMonkey, potentially interrupting your media management tasks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to open a specially crafted MP3 file containing an excessively long URL string in MediaMonkey 4.1.23. A proof-of-concept exploit involves a file named "PoC.mp3" which contains a URL followed by a buffer of 4000 \'A\' characters. Opening this file via the File > Open URL or File... dialog causes the application to crash, indicating the presence of the vulnerability.'}, {'type': 'paragraph', 'content': 'A practical detection method is to use the provided Python script or similar code to generate such a malicious MP3 file and then open it in the vulnerable MediaMonkey version to observe if the application crashes.'}, {'type': 'paragraph', 'content': 'Example command snippet in Python to create the test file:'}, {'type': 'list_item', 'content': 'python -c "open(\'PoC.mp3\', \'wb\').write(b\'http://127.0.0.1/\' + b\'A\' * 4000 + b\'.mp3\')"'}, {'type': 'paragraph', 'content': 'Then open the generated PoC.mp3 file in MediaMonkey via File > Open URL or File... dialog to check if the application crashes, which confirms the vulnerability.'}] [1, 4]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, avoid opening MP3 files from untrusted sources, especially those that might contain embedded URLs.
Do not use the File > Open URL dialog to open MP3 files unless you are certain of their safety.
If possible, update MediaMonkey to a version later than 4.1.23 where this vulnerability is fixed or apply any available patches.
Restrict local user access to MediaMonkey or limit the ability to open files via the vulnerable dialog until a fix is applied.