oss-sec mailing list archives
CVE Request : Serenity Media Player Buffer Overflow
From: Dis close <disclose () cybersecurityworks com>
Date: Wed, 26 Aug 2015 14:31:00 +0530
Hi List: This issue was disclosed and was acknowledged as public disclosure on http://openwall.com/lists/oss-security/2015/08/24/2 We request for a CVE on the below mentioned vulnerability. Below is the detailed information about the exploit code and POC video. Exploit code and stack trace: https://github.com/cybersecurityworks/Diclosed/blob/master/Serenity%20audio%20Player%203.2.3%20SEH%20Buffer%20Overflow <https://www.google.com/url?q=https%3A%2F%2Fgithub.com%2Fcybersecurityworks%2FDiclosed%2Fblob%2Fmaster%2FSerenity%2520audio%2520Player%25203.2.3%2520SEH%2520Buffer%2520Overflow&sa=D&sntz=1&usg=AFQjCNF6zuK_VDbA7UI72gJoxHFlzV7LpA> Exploit Video POC https://youtu.be/ZMC-URZagMg Note : Vulnerability was discovered by below mentioned person and organization. Credit for this vulnerability is requested for following : *Discover Credit:* *Arjun Basnet from Cyber Security Works Pvt Ltd* *----* Thanks in advance Team CSW
Current thread:
- CVE Request : Serenity Media Player Buffer Overflow Dis close (Aug 26)
- Re: CVE Request : Serenity Media Player Buffer Overflow cve-assign (Aug 26)
- Re: CVE Request : Serenity Media Player Buffer Overflow Dis close (Aug 27)
- Re: CVE Request : Serenity Media Player Buffer Overflow cve-assign (Aug 26)