VLC Media Player < 1.1.7 Code Execution Vulnerability (deprecated)

high Nessus Network Monitor Plugin ID 5756

Synopsis

The remote host contains an application that allows arbitrary code execution.

Description

The remote host contains VLC player, a multi-media application.

Versions of VLC media player earlier than 1.1.7 are potentially affected by a code execution vulnerability due to insufficient input validation when parsing a specially crafted Matroska or WebM (MKV) file.

Solution

Upgrade to VLC Media Player version 1.1.7 or later.

See Also

http://www.videolan.org/developers/vlc-branch/NEWS

http://www.videolan.org/security/sa1102.html

Plugin Details

Severity: High

ID: 5756

Family: Web Clients

Published: 2/2/2011

Updated: 3/6/2019

Nessus ID: 51851

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 2/1/2011

Vulnerability Publication Date: 1/30/2011

Exploitable With

Metasploit (VideoLAN VLC MKV Memory Corruption)

Reference Information

CVE: CVE-2011-0531

BID: 46060