Tomabo M3U SEH Based Stack Buffer Overflow
Posted by deepcore on June 21, 2016 – 11:37 pm
This Metasploit module exploits a stack over flow in Tomabo MP4 Player versions 3.11.6 and below. When the application is used to open a specially crafted m3u file, an buffer is overwritten allowing for the execution of arbitrary code.
Post a reply
You must be logged in to post a comment.