CVE-2018-19857

critical

Description

The CAF demuxer in modules/demux/caf.c in VideoLAN VLC media player 3.0.4 may read memory from an uninitialized pointer when processing magic cookies in CAF files, because a ReadKukiChunk() cast converts a return value to an unsigned int even if that value is negative. This could result in a denial of service and/or a potential infoleak.

References

https://www.debian.org/security/2019/dsa-4366

https://usn.ubuntu.com/4074-1/

https://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=0cc5ea748ee5ff7705dde61ab15dff8f58be39d0

https://dyntopia.com/advisories/013-vlc

http://www.securityfocus.com/bid/106130

http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html

http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html

http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html

http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html

Details

Source: Mitre, NVD

Published: 2018-12-05

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Severity: Critical