Vulnerability CVE-2018-19857


Published: 2018-12-05

Description:
The CAF demuxer in modules/demux/caf.c in VideoLAN VLC media player 3.0.4 may read memory from an uninitialized pointer when processing magic cookies in CAF files, because a ReadKukiChunk() cast converts a return value to an unsigned int even if that value is negative. This could result in a denial of service and/or a potential infoleak.

Type:

CWE-824

(Access of Uninitialized Pointer)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.4/10
4.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
Partial
Affected software
Videolan -> Vlc media player 
Debian -> Debian linux 

 References:
http://www.securityfocus.com/bid/106130
https://dyntopia.com/advisories/013-vlc
https://git.videolan.org/?p=vlc.git;a=commit;h=0cc5ea748ee5ff7705dde61ab15dff8f58be39d0
https://usn.ubuntu.com/4074-1/
https://www.debian.org/security/2019/dsa-4366

Copyright 2020, cxsecurity.com

 

Back to Top