CVE-2011-5162

Gomlab Gom Player - Memory Corruption

Title source: rule
STIX 2.1

Description

Stack-based buffer overflow in GOM Player 2.1.33.5071 allows user-assisted remote attackers to execute arbitrary code via a .ASX file with a long URI in the "ref href" tag. NOTE: this issue exists because of a CVE-2007-0707 regression.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Debasish Mandal · pythonlocalwindows
https://www.exploit-db.com/exploits/18174

References (4)

Core 4
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/47009
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/71575
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/18174/
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/33080

Scores

EPSS 0.3599
EPSS Percentile 97.1%

Details

CWE
CWE-119
Status published
Products (1)
gomlab/gom_player 2.1.33.5071
Published Sep 15, 2012
Tracked Since Feb 18, 2026