VLC Media Player < 1.1.6 Multiple Vulnerabilities

high Log Correlation Engine Plugin ID 801178

Synopsis

The remote host contains an application that allows arbitrary code execution.

Description

The remote host contains VLC player, a multi-media application.

Versions of VLC media player earlier than 1.1.6 are potentially affected by multiple vulnerabilities :

- An integer overflow vulnerability exists due to a failure to properly parse the header of a Real Media, which could then trigger a heap-based buffer overflow. It is not yet known if this issue can be exploited to execute arbitrary code. (CVE-2010-3907)

- There are two heap corruption vulnerabilities in the CDG decoders that arise because of a failure to validate indices into statically-sized arrays on the heap, which could allow for arbitrary code execution. (CVE-2011-0021)

- A heap-based memory corruption vulnerability exists i the StripTags function in the USF decoder. (CVE-20111-0522)

Solution

Upgrade to VLC Media Player version 1.1.6 or later.

See Also

git.videolan.org/?p=vlc.git;a=commit;h=6568965770f906d34d4aef83237842a5376adb55

http://.videolan.org/security/sa1007.html

git.videolan.org/?p=vlc.git;a=commit;h=f9b664eac0e1a7bceed9d7b5854fd9fc351b4aab

http://.videolan.org/security/sa1101.html

http://.videolan.org/developers/vlc-branch/NEWS

Plugin Details

Severity: High

ID: 801178

Family: Web Clients

Published: 1/27/2010

Nessus ID: 51772

Vulnerability Information

Patch Publication Date: 1/23/2010

Vulnerability Publication Date: 1/25/2011

Exploitable With

CANVAS (White_Phosphorus)

Reference Information

CVE: CVE-2010-3907, CVE-2011-0021, CVE-2011-0522

BID: 45632, 45927, 46008