Description
Multiple serious vulnerabilities have been found in VideoLAN VLC Media Player. Malicious users can exploit these vulnerabilities to cause a denial of service or execute arbitrary code.
Below is a complete list of vulnerabilities:
- Heap out-of-bound read in CreateHtmlSubtitle and in ParseJSS can be exploited via a specially designed subtitles file possibly to cause a denial of service;
- Potential heap based buffer overflow in Parse JSS can be exploited via a specially designed subtitles file to execute arbitrary code;
- Heap out-of-bound read in ParseJSS can be exploited via a specially designed subtitles file possibly to cause a denial of service.
Technical details
Vulnerabilities (1) exists because of missing check of string termination and allow to read data beyond allocated memory.
Vulnerability (2) exists because of skipping NULL terminator in input strings.
Vulnerability (3) exists because check of string length is missed.
Original advisories
- git.videolan.org CVE-2017-8311 confirm
- git.videolan.org CVE-2017-8313 confirm
- git.videolan.org CVE-2017-8310 confirm
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2017-8310 warning
- CVE-2017-8311 high
- CVE-2017-8312 warning
- CVE-2017-8313 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!