CVE-2023-53874: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Gomlab GOM Player
GOM Player 2.3.90.5360 contains a buffer overflow vulnerability in the equalizer preset name input field that allows attackers to crash the application. Attackers can overwrite the preset name with 260 'A' characters to trigger a buffer overflow and cause application instability.
AI Analysis
Technical Summary
CVE-2023-53874 is a classic buffer overflow vulnerability identified in Gomlab's GOM Player version 2.3.90.5360. The flaw exists in the handling of the equalizer preset name input field, where the application fails to validate the size of the input string before copying it into a fixed-size buffer. Specifically, an attacker can input a string of 260 'A' characters, exceeding the buffer capacity, which leads to memory corruption. This buffer overflow can cause the application to crash or behave unpredictably, resulting in denial of service. The vulnerability requires local access and user interaction, as the attacker must input the malicious preset name, for example, by manually creating or modifying an equalizer preset. No privileges or authentication are required to trigger the flaw. The CVSS v4.0 base score is 6.7 (medium severity), reflecting the local attack vector, low complexity, no privileges required, but requiring user interaction. There is no indication of remote exploitation or code execution capabilities, and no known exploits have been reported in the wild. The vulnerability primarily impacts availability by causing application instability but does not compromise confidentiality or integrity. The lack of a patch link suggests that a fix may not yet be publicly available, so users should exercise caution. This vulnerability is relevant for environments where GOM Player is used, especially in media playback or editing contexts.
Potential Impact
For European organizations, the primary impact of CVE-2023-53874 is the potential for denial of service due to application crashes when the vulnerable GOM Player version is used. This can disrupt media playback workflows, particularly in industries relying on multimedia content such as broadcasting, media production, and entertainment. While the vulnerability does not allow for remote code execution or data theft, the instability can lead to productivity loss and operational interruptions. Organizations with large user bases running the affected version may experience widespread disruption if exploited. Additionally, the requirement for user interaction limits large-scale automated exploitation but does not eliminate risk from insider threats or targeted attacks. The absence of known exploits reduces immediate risk but does not preclude future exploitation. The impact on confidentiality and integrity is minimal, but availability concerns remain significant for critical media environments.
Mitigation Recommendations
To mitigate CVE-2023-53874, organizations should first verify if they are running GOM Player version 2.3.90.5360. If so, they should monitor Gomlab's official channels for patches or updates addressing this vulnerability and apply them promptly once available. Until a patch is released, restrict the use of the vulnerable version by disabling or uninstalling GOM Player where feasible. Implement application whitelisting and restrict user permissions to prevent unauthorized modification of equalizer presets. Educate users about the risk of inputting unusually long strings in preset names and encourage cautious use of custom presets. Employ endpoint protection solutions that can detect anomalous application crashes or buffer overflow attempts. For environments where media playback is critical, consider alternative media players with no known vulnerabilities. Regularly audit installed software versions and maintain an inventory to quickly identify vulnerable instances. Finally, implement robust incident response procedures to quickly address any crashes or instability potentially linked to exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2023-53874: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Gomlab GOM Player
Description
GOM Player 2.3.90.5360 contains a buffer overflow vulnerability in the equalizer preset name input field that allows attackers to crash the application. Attackers can overwrite the preset name with 260 'A' characters to trigger a buffer overflow and cause application instability.
AI-Powered Analysis
Technical Analysis
CVE-2023-53874 is a classic buffer overflow vulnerability identified in Gomlab's GOM Player version 2.3.90.5360. The flaw exists in the handling of the equalizer preset name input field, where the application fails to validate the size of the input string before copying it into a fixed-size buffer. Specifically, an attacker can input a string of 260 'A' characters, exceeding the buffer capacity, which leads to memory corruption. This buffer overflow can cause the application to crash or behave unpredictably, resulting in denial of service. The vulnerability requires local access and user interaction, as the attacker must input the malicious preset name, for example, by manually creating or modifying an equalizer preset. No privileges or authentication are required to trigger the flaw. The CVSS v4.0 base score is 6.7 (medium severity), reflecting the local attack vector, low complexity, no privileges required, but requiring user interaction. There is no indication of remote exploitation or code execution capabilities, and no known exploits have been reported in the wild. The vulnerability primarily impacts availability by causing application instability but does not compromise confidentiality or integrity. The lack of a patch link suggests that a fix may not yet be publicly available, so users should exercise caution. This vulnerability is relevant for environments where GOM Player is used, especially in media playback or editing contexts.
Potential Impact
For European organizations, the primary impact of CVE-2023-53874 is the potential for denial of service due to application crashes when the vulnerable GOM Player version is used. This can disrupt media playback workflows, particularly in industries relying on multimedia content such as broadcasting, media production, and entertainment. While the vulnerability does not allow for remote code execution or data theft, the instability can lead to productivity loss and operational interruptions. Organizations with large user bases running the affected version may experience widespread disruption if exploited. Additionally, the requirement for user interaction limits large-scale automated exploitation but does not eliminate risk from insider threats or targeted attacks. The absence of known exploits reduces immediate risk but does not preclude future exploitation. The impact on confidentiality and integrity is minimal, but availability concerns remain significant for critical media environments.
Mitigation Recommendations
To mitigate CVE-2023-53874, organizations should first verify if they are running GOM Player version 2.3.90.5360. If so, they should monitor Gomlab's official channels for patches or updates addressing this vulnerability and apply them promptly once available. Until a patch is released, restrict the use of the vulnerable version by disabling or uninstalling GOM Player where feasible. Implement application whitelisting and restrict user permissions to prevent unauthorized modification of equalizer presets. Educate users about the risk of inputting unusually long strings in preset names and encourage cautious use of custom presets. Employ endpoint protection solutions that can detect anomalous application crashes or buffer overflow attempts. For environments where media playback is critical, consider alternative media players with no known vulnerabilities. Regularly audit installed software versions and maintain an inventory to quickly identify vulnerable instances. Finally, implement robust incident response procedures to quickly address any crashes or instability potentially linked to exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-12-13T14:25:04.998Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69407360d9bcdf3f3d00c3bf
Added to database: 12/15/2025, 8:45:20 PM
Last enriched: 12/15/2025, 9:04:16 PM
Last updated: 12/17/2025, 8:42:21 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66647: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in RIOT-OS RIOT
LowCVE-2025-14764: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS S3 Encryption Client for Go
MediumCVE-2025-14763: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS S3 Encryption Client for Java
MediumCVE-2025-14762: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS AWS SDK for Ruby
MediumCVE-2025-14761: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in AWS AWS SDK for PHP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.