VLC Media Player < 1.1.5 Buffer Overflow

This script is Copyright (C) 2010-2011 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a media player that allows arbitrary
code execution.

Description :

The version of VLC media player installed on the remote Windows host
is earlier than 1.1.5. Such versions are vulnerable to a stack
smashing attack in the Samba network share access module due to an
error in the way VLC calls the Windows API function
'WNetAddConnection2A()' when opening 'smb://' URLs.

If an attacker can trick a user into opening a specially crafted URL
with the affected application, he can leverage this issue to execute
arbitrary code subject to that user's permissions.

See also :

http://shinnai.altervista.org/exploits/SH-008-20101026.html
http://www.videolan.org/security/sa1006.html
http://www.videolan.org/developers/vlc-branch/NEWS

Solution :

Upgrade to VLC Media Player version 1.1.5 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 50650 ()

Bugtraq ID: 44909

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now