Executive Summary

Name CVE-2009-2550 First vendor Publication 2009-07-20
Vendor Cve Last vendor Modification 2017-09-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Stack-based buffer overflow in Hamster Audio Player 0.3a allows remote attackers to execute arbitrary code via a long string in a (1) .m3u or (2) .hpl playlist file.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2550

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-42 MIME Conversion
CAPEC-44 Overflow Binary Resource File
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-100 Overflow Buffers

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

Application 1

OpenVAS Exploits

Date Description
2009-07-23 Name : Hamster Audio Player Buffer Overflow Vulnerability
File : nvt/secpod_hamster_audio_player_bof_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
55871 Hamster Audio Player Multiple Playlist File Handling Overflow

Sources (Detail)

Source Url
EXPLOIT-DB http://www.exploit-db.com/exploits/9157
OSVDB http://osvdb.org/55871
SECUNIA http://secunia.com/advisories/35825
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/51732

Alert History

If you want to see full details history, please login or register.
Date Informations
2021-05-04 12:09:51
  • Multiple Updates
2021-04-22 01:10:11
  • Multiple Updates
2020-05-23 00:24:04
  • Multiple Updates
2017-09-19 09:23:19
  • Multiple Updates
2017-08-17 09:22:39
  • Multiple Updates
2016-06-28 17:46:25
  • Multiple Updates
2016-04-26 18:59:12
  • Multiple Updates
2013-05-10 23:54:18
  • Multiple Updates