Mobipocket Reader CHM File Handling Remote Overflow

High Nessus Plugin ID 59108


The remote Windows host contains an eBook reader that is affected by a buffer overflow vulnerability.


All versions of Mobipocket Reader are potentially affected by a stack-based buffer overflow vulnerability.

The application does not properly validate user input and can allow crafted 'CHM' files to either crash the application or execute arbitrary code if an attack is successful.

Note that Mobipocket Reader is no longer supported which implies no new security patches will be released.


Remove the software as it is no longer supported.

See Also

Plugin Details

Severity: High

ID: 59108

File Name: mobipocket_reader_chm_bufferoverflow.nasl

Version: $Revision: 1.4 $

Type: local

Agent: windows

Family: Windows

Published: 2012/05/16

Modified: 2015/01/12

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:U/RC:ND

Vulnerability Information

CPE: x-cpe:/a:amazon:mobipocket_reader

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2012/04/23

Reference Information

BID: 53200

OSVDB: 81328

EDB-ID: 18774