Xenorate versions up to and including 2.50, a Windows-based multimedia player, is vulnerable to a stack-based buffer overflow when processing .xpl playlist files. The application fails to properly validate the length of input data, allowing an attacker to craft a malicious .xpl file that overwrites the Structured Exception Handler (SEH) and enables arbitrary code execution. Exploitation requires local interaction, typically by convincing a user to open the crafted file.
Metrics
Affected Vendors & Products
References
History
Sat, 23 Aug 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Xenorate Xenorate xenorate |
|
Vendors & Products |
Microsoft
Microsoft windows Xenorate Xenorate xenorate |
Thu, 21 Aug 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Aug 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Xenorate versions up to and including 2.50, a Windows-based multimedia player, is vulnerable to a stack-based buffer overflow when processing .xpl playlist files. The application fails to properly validate the length of input data, allowing an attacker to craft a malicious .xpl file that overwrites the Structured Exception Handler (SEH) and enables arbitrary code execution. Exploitation requires local interaction, typically by convincing a user to open the crafted file. | |
Title | Xenorate <= 2.50 .xpl File Stack-Based Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-21T20:15:39.883Z
Updated: 2025-08-21T20:42:27.958Z
Reserved: 2025-08-21T16:26:55.212Z
Link: CVE-2009-20003

Updated: 2025-08-21T20:42:21.441Z

Status : Awaiting Analysis
Published: 2025-08-21T21:15:32.897
Modified: 2025-08-22T18:08:51.663
Link: CVE-2009-20003

No data.