KLA11023
Multiple vulnerabilities in VideoLAN VLC Media Player
Обновлено: 17/06/2019
Дата обнаружения
23/05/2017
Уровень угрозы
High
Описание

Multiple serious vulnerabilities have been found in VideoLAN VLC Media Player. Malicious users can exploit these vulnerabilities to cause a denial of service or execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Heap out-of-bound read in CreateHtmlSubtitle and in ParseJSS can be exploited via a specially designed subtitles file possibly to cause a denial of service;
  2. Potential heap based buffer overflow in Parse JSS can be exploited via a specially designed subtitles file to execute arbitrary code;
  3. Heap out-of-bound read in ParseJSS can be exploited via a specially designed subtitles file possibly to cause a denial of service.

Technical details

Vulnerabilities (1) exists because of missing check of string termination and allow to read data beyond allocated memory.

Vulnerability (2) exists because of skipping NULL terminator in input strings.

Vulnerability (3) exists because check of string length is missed.

Пораженные продукты

VideoLAN VLC Media Player earlier than 2.2.5

Решение

Update to the latest version
Download VLC media player

Первичный источник обнаружения
git.videolan.org CVE-2017-8312 confirm
git.videolan.org CVE-2017-8311 confirm
git.videolan.org CVE-2017-8313 confirm
git.videolan.org CVE-2017-8310 confirm
Оказываемое влияние
?
ACE 
[?]

DoS 
[?]
Связанные продукты
VLC media player
CVE-IDS
CVE-2017-83104.3Warning
CVE-2017-83116.8High
CVE-2017-83124.3Warning
CVE-2017-83134.3Warning