FreeBSD : vlc -- arbitrary code execution in the RealMedia processor (acf80afa-c3ef-11dd-a721-0030843d3802)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Tobias Klein from TrapKit reports :

The VLC media player contains an integer overflow vulnerability while
parsing malformed RealMedia (.rm) files. The vulnerability leads to a
heap overflow that can be exploited by a (remote) attacker to execute
arbitrary code in the context of VLC media player.

See also :

http://www.trapkit.de/advisories/TKADV2008-013.txt
http://www.videolan.org/security/sa0811.html
http://www.nessus.org/u?e5ac9c1e

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 35056 (freebsd_pkg_acf80afac3ef11dda7210030843d3802.nasl)

Bugtraq ID: 32545

CVE ID: CVE-2008-5276

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now