First published: Tue Apr 09 2019(Updated: )
When processing subtitles format media file, KMPlayer version 2018.12.24.14 or lower doesn't check object size correctly, which leads to integer underflow then to memory out-of-bound read/write. An attacker can exploit this issue by enticing an unsuspecting user to open a malicious file.
Credit: vuln@krcert.or.kr vuln@krcert.or.kr
Affected Software | Affected Version | How to fix |
---|---|---|
Layer5 Meshery | <=2018.12.24.14 | |
Microsoft Windows | ||
Fedora | =29 | |
Fedora | =30 | |
All of | ||
Layer5 Meshery | <=2018.12.24.14 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9133 is classified as a critical vulnerability due to its potential for memory out-of-bound read/write exploitation.
To fix CVE-2019-9133, users should update KMPlayer to the latest version beyond 2018.12.24.14.
KMPlayer versions 2018.12.24.14 and lower are affected by CVE-2019-9133.
CVE-2019-9133 affects the KMPlayer application on Windows and Fedora operating systems.
Yes, CVE-2019-9133 can be exploited by enticing users to open a malicious subtitle file.