VLC Media Player < 1.0.1 real_get_rdt_chunk() Function Overflow

high Nessus Plugin ID 40466

Synopsis

The remote Windows host contains an application that is affected by a buffer overflow vulnerability.

Description

The version of VLC media player installed on the remote host is earlier than 1.0.1. Such versions contain an integer underflow involving the integer 'size' in the 'real_get_rdt_chunk_header()' function that can be triggered when reading Real Data Transport (RDT) chunk headers. This 'size' variable is used before the underflow to allocate storage on the heap and then after it to read an excessive amount of data from the network via the 'rtsp_read_data()' function, resulting in a buffer overflow. If an attacker can trick a user into opening a specially crafted RTSP stream with the affected application, arbitrary code could be executed, subject to the user's privileges.

Solution

Upgrade to VLC Media Player version 1.0.1 or later.

See Also

https://seclists.org/bugtraq/2009/Jul/196

http://wiki.videolan.org/Changelog/1.0.1#Access

Plugin Details

Severity: High

ID: 40466

File Name: vlc_1_0_1.nasl

Version: 1.10

Type: local

Agent: windows

Family: Windows

Published: 8/1/2009

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Vulnerability Information

CPE: cpe:/a:videolan:vlc_media_player

Required KB Items: SMB/VLC/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 7/28/2009

Vulnerability Publication Date: 7/27/2009

Reference Information

BID: 35821

Secunia: 36037