VLC Media Player 2.0.4 buffer overflows in freetype renderer

2013-03-18 / 2013-03-20
Credit: Aliz Hammond
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

Summary : Buffer overflows in freetype renderer and HTML subtitle parser Date : January 2013 Affected versions : VLC media player 2.0.4 and earlier ID : VideoLAN-SA-1301 CVE reference : None Details When parsing a specially crafted file, a buffer overflow might occur. Impact If successful, a malicious third party could trigger an invalid memory access, leading to a crash of VLC or arbitratry code execution. Threat mitigation Exploitation of this issue requires the user to explicitly open a specially crafted file. In the case of the subtitle vulnerability, subtitles must be enabled. ASLR and DEP help reduce exposure, but may be bypassed. Workarounds The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied. Solution VLC media player 2.0.5 addresses this issue. Patches for older versions are available from the official VLC source code repository 2.0. Credits This vulnerability was reported by Aliz Hammond. References The VideoLAN project http://www.videolan.org/ VLC official GIT repository http://git.videolan.org/?p=vlc.git History 17 November 2012 Patch for VLC development version. 7 December 2012 Security vulnerability disclosed. 14 December 2012 VLC 2.0.5 released. 3 January 2013 Security advisory published Scott Walsh, on behalf of the VideoLAN project

References:

http://git.videolan.org/?p=vlc/vlc-2.0.git;a=commitdiff;h=9b0414dc7f5c18ff2951175cf076779c444efd70
http://www.videolan.org/security/sa1301.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top