VLC get_chunk_header Function TiVo File Remote Code Execution

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a media player that is affected by a
code execution vulnerability.

Description :

The version of VLC installed on the remote host is 0.x later than 0.9.0
or 1.x earlier than or equal to 1.1.12. It, therefore, contains a
double-free error in the function 'get_chunk_header' in the file
'modules/demux/ty.c'. This error can be exploited by a specially
crafted TiVo (TY) file, which could lead to remote arbitrary code
execution.

See also :

http://www.videolan.org/security/sa1108.html

Solution :

Upgrade to VLC version 1.1.13 / 2.0.0 or later. Alternatively, remove
any affected plugin files from VLC's plugins directory.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 63137 ()

Bugtraq ID: 51231

CVE ID: CVE-2012-0023

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now