Описание
Multiple serious vulnerabilities have been found in VideoLAN VLC Media Player. Malicious users can exploit these vulnerabilities to cause a denial of service or execute arbitrary code.
Below is a complete list of vulnerabilities:
- Heap out-of-bound read in CreateHtmlSubtitle and in ParseJSS can be exploited via a specially designed subtitles file possibly to cause a denial of service;
- Potential heap based buffer overflow in Parse JSS can be exploited via a specially designed subtitles file to execute arbitrary code;
- Heap out-of-bound read in ParseJSS can be exploited via a specially designed subtitles file possibly to cause a denial of service.
Technical details
Vulnerabilities (1) exists because of missing check of string termination and allow to read data beyond allocated memory.
Vulnerability (2) exists because of skipping NULL terminator in input strings.
Vulnerability (3) exists because check of string length is missed.
Первичный источник обнаружения
- git.videolan.org CVE-2017-8312 confirm
git.videolan.org CVE-2017-8311 confirm
git.videolan.org CVE-2017-8313 confirm
git.videolan.org CVE-2017-8310 confirm
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2017-8310 warning
- CVE-2017-8311 high
- CVE-2017-8312 warning
- CVE-2017-8313 warning
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!