Jump to content

Sony's SonicStage CP allows code injection

Rate this topic


Recommended Posts

source http://www.heise-security.co.uk/news/98181

Sony's SonicStage CP allows code injection

Sony uses SonicStage CP software for loading its MP3 players. However, the application processes crafted playlists incorrectly, so that attackers can inject and execute external code.

According to a security advisory from Secunia, the security vulnerability was discovered by Parvez Anwar. If a .m3u playlist contains an entry with more than 1000 characters, a buffer overflow can occur. A sample program which is meant to demonstrate the vulnerability has now appeared on milw0rm.

The bug apparently affects the current version 4.3 of SonicStage CP and possibly previous versions. No update is yet available, so users of this software should not open .m3u playlists for the time being.

# Sample program demonstrating the vulnerability on milw0rm

# Sony CONNECT Player M3U Playlist Processing Buffer Overflow, security advisory from Secunia

Link to comment
Share on other sites

The easiest way to avoid any problems is to never use M3Us from an unknown source. Or to check them using a text editor, such as Notepad, for the presence of any strings longer than 1000 symbols. Actually, there shouldn't be any strings longer than about 100 symbols, and those are for songs with really long names.

Link to comment
Share on other sites

  • 1 month later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...