CVE-2011-10025
Severity CVSS v4.0:
HIGH
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
20/08/2025
Last modified:
22/08/2025
Description
Subtitle Processor 7.7.1 contains a buffer overflow vulnerability in its .m3u file parser. When a crafted playlist file is opened, the application converts input to Unicode and copies it to a fixed-size stack buffer without proper bounds checking. This allows an attacker to overwrite the Structured Exception Handler (SEH) and execute arbitrary code.
Impact
Base Score 4.0
8.50
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/subtitle_processor_m3u_bof.rb
- https://sourceforge.net/projects/subtitleproc/
- https://www.exploit-db.com/exploits/17217
- https://www.exploit-db.com/exploits/17225
- https://www.fortiguard.com/encyclopedia/ips/26849
- https://www.vulncheck.com/advisories/subtitle-processor-m3u-seh-unicode-buffer-overflow



