KLA11023
Multiple vulnerabilities in VideoLAN VLC Media Player

Updated: 09/26/2023
Detect date
?
05/23/2017
Severity
?
High
Description

Multiple serious vulnerabilities have been found in VideoLAN VLC Media Player. Malicious users can exploit these vulnerabilities to cause a denial of service or execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Heap out-of-bound read in CreateHtmlSubtitle and in ParseJSS can be exploited via a specially designed subtitles file possibly to cause a denial of service;
  2. Potential heap based buffer overflow in Parse JSS can be exploited via a specially designed subtitles file to execute arbitrary code;
  3. Heap out-of-bound read in ParseJSS can be exploited via a specially designed subtitles file possibly to cause a denial of service.

Technical details

Vulnerabilities (1) exists because of missing check of string termination and allow to read data beyond allocated memory.

Vulnerability (2) exists because of skipping NULL terminator in input strings.

Vulnerability (3) exists because check of string length is missed.

Affected products

VideoLAN VLC Media Player earlier than 2.2.5

Solution

Update to the latest version
Download VLC media player

Original advisories

git.videolan.org CVE-2017-8312 confirm
git.videolan.org CVE-2017-8311 confirm
git.videolan.org CVE-2017-8313 confirm
git.videolan.org CVE-2017-8310 confirm

Impacts
?
ACE 
[?]

DoS 
[?]
Related products
VLC media player
CVE-IDS
?
CVE-2017-83104.3Warning
CVE-2017-83116.8High
CVE-2017-83124.3Warning
CVE-2017-83134.3Warning
Exploitation

Public exploits exist for this vulnerability.

Find out the statistics of the vulnerabilities spreading in your region