CVE-2019-19513

9.8 CRITICAL

📋 TL;DR

CVE-2019-19513 is an out-of-bounds write vulnerability in the BASSMIDI plugin for Un4seen BASS Audio Library on Windows. Successful exploitation allows remote code execution, potentially giving attackers full control of affected systems. Users of applications that incorporate this vulnerable audio library component are at risk.

💻 Affected Systems

Products:
  • Un4seen BASS Audio Library with BASSMIDI plugin
Versions: BASSMIDI plugin version 2.4.12.1 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that use the BASSMIDI plugin component of the BASS Audio Library.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full system control through arbitrary code execution, leading to complete compromise of the target machine.

🟠

Likely Case

Remote code execution leading to malware installation, data theft, or system takeover in vulnerable applications.

🟢

If Mitigated

Denial of service if exploitation fails, or no impact if the vulnerable component is not used or properly isolated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept code is publicly available, making exploitation relatively straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BASSMIDI plugin version 2.4.12.2 or later

Vendor Advisory: http://www.un4seen.com/

Restart Required: Yes

Instructions:

1. Download the latest BASSMIDI plugin from un4seen.com. 2. Replace the vulnerable bassmidi.dll file with the updated version. 3. Restart any applications using the library.

🔧 Temporary Workarounds

Disable BASSMIDI plugin

windows

Remove or disable the bassmidi.dll plugin to prevent exploitation

move bassmidi.dll bassmidi.dll.bak

Application control blocking

windows

Use application whitelisting to block execution of bassmidi.dll

🧯 If You Can't Patch

  • Network segmentation to isolate systems using vulnerable BASSMIDI plugin
  • Implement strict application control policies to prevent unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Check the version of bassmidi.dll file properties or use 'bassmidi.dll' file version check

Check Version:

wmic datafile where name="C:\\path\\to\\bassmidi.dll" get version

Verify Fix Applied:

Verify bassmidi.dll file version is 2.4.12.2 or higher

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to bassmidi.dll
  • Unexpected process creation from audio-related applications

Network Indicators:

  • Unusual network connections from audio processing applications

SIEM Query:

Process creation where parent process contains 'bass' and child process is suspicious

🔗 References

📤 Share & Export