Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53874: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Gomlab GOM Player

0
Medium
VulnerabilityCVE-2023-53874cvecve-2023-53874
Published: Mon Dec 15 2025 (12/15/2025, 20:28:16 UTC)
Source: CVE Database V5
Vendor/Project: Gomlab
Product: GOM Player

Description

GOM Player 2.3.90.5360 contains a buffer overflow vulnerability in the equalizer preset name input field that allows attackers to crash the application. Attackers can overwrite the preset name with 260 'A' characters to trigger a buffer overflow and cause application instability.

AI-Powered Analysis

AILast updated: 12/15/2025, 21:04:16 UTC

Technical Analysis

CVE-2023-53874 is a classic buffer overflow vulnerability identified in Gomlab's GOM Player version 2.3.90.5360. The flaw exists in the handling of the equalizer preset name input field, where the application fails to validate the size of the input string before copying it into a fixed-size buffer. Specifically, an attacker can input a string of 260 'A' characters, exceeding the buffer capacity, which leads to memory corruption. This buffer overflow can cause the application to crash or behave unpredictably, resulting in denial of service. The vulnerability requires local access and user interaction, as the attacker must input the malicious preset name, for example, by manually creating or modifying an equalizer preset. No privileges or authentication are required to trigger the flaw. The CVSS v4.0 base score is 6.7 (medium severity), reflecting the local attack vector, low complexity, no privileges required, but requiring user interaction. There is no indication of remote exploitation or code execution capabilities, and no known exploits have been reported in the wild. The vulnerability primarily impacts availability by causing application instability but does not compromise confidentiality or integrity. The lack of a patch link suggests that a fix may not yet be publicly available, so users should exercise caution. This vulnerability is relevant for environments where GOM Player is used, especially in media playback or editing contexts.

Potential Impact

For European organizations, the primary impact of CVE-2023-53874 is the potential for denial of service due to application crashes when the vulnerable GOM Player version is used. This can disrupt media playback workflows, particularly in industries relying on multimedia content such as broadcasting, media production, and entertainment. While the vulnerability does not allow for remote code execution or data theft, the instability can lead to productivity loss and operational interruptions. Organizations with large user bases running the affected version may experience widespread disruption if exploited. Additionally, the requirement for user interaction limits large-scale automated exploitation but does not eliminate risk from insider threats or targeted attacks. The absence of known exploits reduces immediate risk but does not preclude future exploitation. The impact on confidentiality and integrity is minimal, but availability concerns remain significant for critical media environments.

Mitigation Recommendations

To mitigate CVE-2023-53874, organizations should first verify if they are running GOM Player version 2.3.90.5360. If so, they should monitor Gomlab's official channels for patches or updates addressing this vulnerability and apply them promptly once available. Until a patch is released, restrict the use of the vulnerable version by disabling or uninstalling GOM Player where feasible. Implement application whitelisting and restrict user permissions to prevent unauthorized modification of equalizer presets. Educate users about the risk of inputting unusually long strings in preset names and encourage cautious use of custom presets. Employ endpoint protection solutions that can detect anomalous application crashes or buffer overflow attempts. For environments where media playback is critical, consider alternative media players with no known vulnerabilities. Regularly audit installed software versions and maintain an inventory to quickly identify vulnerable instances. Finally, implement robust incident response procedures to quickly address any crashes or instability potentially linked to exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-13T14:25:04.998Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69407360d9bcdf3f3d00c3bf

Added to database: 12/15/2025, 8:45:20 PM

Last enriched: 12/15/2025, 9:04:16 PM

Last updated: 12/17/2025, 8:42:21 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats