First published: Mon Dec 04 2006(Updated: )
Buffer overflow in Quintessential Player 4.50.1.82 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) M3u or (2) M3u-8 file; or a (3) crafted PLS file with a long value in the (a) NumberofEntries, (b) Length (aka Length1), (c) Filename (aka File1), (d) Title (aka Title1) field, or other unspecified fields.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | ||
Microsoft Windows 9x | ||
Microsoft Windows 9x | =gold | |
Microsoft Windows | ||
Microsoft Windows NT | =4.0 | |
Microsoft Windows XP | ||
Quinnware Quintessential Player | <=4.50.1.82 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6261 is classified as a high severity vulnerability due to its potential to cause a denial of service and arbitrary code execution.
To mitigate CVE-2006-6261, you should upgrade to Quintessential Player version 4.50.1.83 or later where the vulnerability is addressed.
CVE-2006-6261 can be exploited via crafted M3u, M3u-8, or PLS files with specific long values.
CVE-2006-6261 affects Quintessential Player versions up to and including 4.50.1.82.
Yes, CVE-2006-6261 can allow remote attackers to execute arbitrary code on the affected systems.