BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Groovy Media Player Buffer Overflow

Disclosed April 4, 2013    Zeroday : 567 days

Vulnerability Description:

Groovy Media Player contains a memory corruption caused by a specially crafted MP3 file. A remote attacker may leverage this vulnerability to cause a denial of service condition, or worse, gain arbitrary code execution.

Vendors:

BestWebSharing

Vulnerable Software/Devices:

Groovy Media Player v3.2.0 and possibly earlier versions.

Vulnerability Severity:

High

Exploit Availability:

Publicly Available

Exploit Impact:

Remote Code Execution
This client-side vulnerability could allow an attacker to gain the ability to execute remote arbitrary code with the same permissions as the user that is currently logged in. If the user is an administrator, the attacker could install malicious software and further compromise the system.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 19762 - Groovy Media Player Buffer Overflow (Zero-Day)

Mitigation:

Do not open untrusted MP3 files with Groovy Media Player. 

Links:

CVE(s):