Xion Audio Player versions prior to 1.0.126 are vulnerable to a Unicode-based stack buffer overflow triggered by opening a specially crafted .m3u playlist file. The file contains an overly long string that overwrites the Structured Exception Handler (SEH) chain, allowing an attacker to hijack execution flow and run arbitrary code.
Metrics
Affected Vendors & Products
References
History
Wed, 20 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 Aug 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Xion Audio Player versions prior to 1.0.126 are vulnerable to a Unicode-based stack buffer overflow triggered by opening a specially crafted .m3u playlist file. The file contains an overly long string that overwrites the Structured Exception Handler (SEH) chain, allowing an attacker to hijack execution flow and run arbitrary code. | |
| Title | Xion Audio Player ≤ 1.0.126 Unicode Stack Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-20T15:42:51.014Z
Updated: 2025-08-20T18:44:17.690Z
Reserved: 2025-08-19T16:00:37.407Z
Link: CVE-2010-20042
Updated: 2025-08-20T18:15:58.336Z
Status : Awaiting Analysis
Published: 2025-08-20T16:15:33.413
Modified: 2025-08-22T18:09:17.710
Link: CVE-2010-20042
No data.