fkie_cve-2013-5716
Vulnerability from fkie_nvd
Published
2013-09-09 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
Gretech GOM Media Player 2.2.53.5169 and possibly earlier allows remote attackers to cause a denial of service (application crash) via a crafted WAV file.
Impacted products
Vendor Product Version
gomlab gom_player *
gomlab gom_player 2.0.6
gomlab gom_player 2.0.9
gomlab gom_player 2.0.11
gomlab gom_player 2.0.12
gomlab gom_player 2.1.1
gomlab gom_player 2.1.2
gomlab gom_player 2.1.3
gomlab gom_player 2.1.6
gomlab gom_player 2.1.8
gomlab gom_player 2.1.9.3753
gomlab gom_player 2.1.9.3754
gomlab gom_player 2.1.14.4525
gomlab gom_player 2.1.15.4610
gomlab gom_player 2.1.16.4631
gomlab gom_player 2.1.17.4710
gomlab gom_player 2.1.18.4762
gomlab gom_player 2.1.21.4846
gomlab gom_player 2.1.25.5015
gomlab gom_player 2.1.27.5031
gomlab gom_player 2.1.28.5039
gomlab gom_player 2.1.33.5071
gomlab gom_player 2.1.37.5085
gomlab gom_player 2.1.39.5101
gomlab gom_player 2.1.40.5106
gomlab gom_player 2.1.43.5119
gomlab gom_player 2.1.47.5133
gomlab gom_player 2.1.49.5139
gomlab gom_player 2.1.50.5145



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2B1681-4E25-4FD5-89A2-606A0508E36F",
              "versionEndIncluding": "2.2.53.5169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A2E99B-8B6C-4D39-A196-7F7D1424171D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E48E0F4D-79BF-42F9-A95C-2BB849808D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA9DCC1-071F-4492-B12C-7029B1A17C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1709BFD8-62F8-4E4C-BA51-9787A0DEA24F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C65ECAC-1FCC-4B16-A1BA-3CCC0CE64C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B58B3D-8E5A-4146-9078-B67CA272DF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "36AFCA29-3A66-4253-8957-3AEA15E92D75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "295F383E-1592-4C0F-B1F8-950A56F2AD22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353D0E41-4068-4083-96CD-6A52A585344E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.9.3753:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB55BAE1-52D1-434A-B561-3116B5872BDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.9.3754:*:*:*:*:*:*:*",
              "matchCriteriaId": "59F5D5C9-B423-47C6-9529-5A2A71D92062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.14.4525:*:*:*:*:*:*:*",
              "matchCriteriaId": "E879E961-35C4-41BA-A2BC-AF0321038FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.15.4610:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA8BA4E-3E85-4B2C-82D3-739BF4287719",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.16.4631:*:*:*:*:*:*:*",
              "matchCriteriaId": "259B01B8-ABD5-49CE-94E0-CE6D70647EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.17.4710:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9A8FC4-9E26-4B0E-AE2B-890727467841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.18.4762:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3BA4FE-B4BF-428B-9B42-38C3254AAE7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.21.4846:*:*:*:*:*:*:*",
              "matchCriteriaId": "94B5D090-7F22-461A-BBA2-039827B3C1CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.25.5015:*:*:*:*:*:*:*",
              "matchCriteriaId": "95E048CE-EFA5-4BC8-8434-C27197EB9FD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.27.5031:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A126C57-AA7F-40E0-A736-2B7A322CBAC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.28.5039:*:*:*:*:*:*:*",
              "matchCriteriaId": "A091B7FB-499F-4456-9C84-A5BAF6B5924D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.33.5071:*:*:*:*:*:*:*",
              "matchCriteriaId": "C24D09B3-D145-4B9D-97E4-A6AA226AFD33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.37.5085:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F70A6EA-A414-475A-B24E-D723B4575C37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.39.5101:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB2ADB6E-C040-45A6-985B-901C833E6A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.40.5106:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F1DD10-EC69-4F9A-A8C9-4C2043ECFF97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.43.5119:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C20130-8A66-4C16-BD34-46D4F22667C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.47.5133:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFCBF075-EF88-4B9D-B5DB-64379FDA1ADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.49.5139:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E96FBE-8824-467B-9221-1046D8CBF086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gomlab:gom_player:2.1.50.5145:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E43231-5721-4251-8D32-C13F4AC471B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Gretech GOM Media Player 2.2.53.5169 and possibly earlier allows remote attackers to cause a denial of service (application crash) via a crafted WAV file."
    },
    {
      "lang": "es",
      "value": "Gretech GOM Media Player 2.2.53.5169 y posiblemente anteriores permite a un atacante remoto causar una denegaci\u00f3n de servicio (cuelgue de aplicaci\u00f3n) a trav\u00e9s de un archivo WAV manipulado."
    }
  ],
  "id": "CVE-2013-5716",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-09-09T17:55:06.343",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/28080"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/62173"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/28080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/62173"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…