FreeBSD : vlc -- arbitrary code execution in Real RTSP and MMS support (62f36dfd-ff56-11e1-8821-001b2134ef46)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Jean-Baptiste Kempf, on behalf of the VideoLAN project reports :

If successful, a malicious third party could crash the VLC media
player process. Arbitrary code execution could be possible on some
systems.

See also :

http://www.videolan.org/security/sa1201.html
http://www.videolan.org/security/sa1202.html
http://www.nessus.org/u?77636d34

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 62114 ()

Bugtraq ID:

CVE ID: CVE-2012-1775
CVE-2012-1776

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now