Xion Audio Player versions prior to 1.0.126 are vulnerable to a Unicode-based stack buffer overflow triggered by opening a specially crafted .m3u playlist file. The file contains an overly long string that overwrites the Structured Exception Handler (SEH) chain, allowing an attacker to hijack execution flow and run arbitrary code.
Metrics
Affected Vendors & Products
References
History
Wed, 20 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 20 Aug 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Xion Audio Player versions prior to 1.0.126 are vulnerable to a Unicode-based stack buffer overflow triggered by opening a specially crafted .m3u playlist file. The file contains an overly long string that overwrites the Structured Exception Handler (SEH) chain, allowing an attacker to hijack execution flow and run arbitrary code. | |
Title | Xion Audio Player ≤ 1.0.126 Unicode Stack Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-20T15:42:51.014Z
Updated: 2025-08-20T18:44:17.690Z
Reserved: 2025-08-19T16:00:37.407Z
Link: CVE-2010-20042

Updated: 2025-08-20T18:15:58.336Z

Status : Received
Published: 2025-08-20T16:15:33.413
Modified: 2025-08-20T16:15:33.413
Link: CVE-2010-20042

No data.