FreeBSD : mpv -- arbitrary code execution via crafted website (3ee6e521-0d32-11e8-99b0-d017c2987f9a)

high Nessus Plugin ID 106734

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

mpv developers report :

mpv through 0.28.0 allows remote attackers to execute arbitrary code via a crafted website, because it reads HTML documents containing VIDEO elements, and accepts arbitrary URLs in a src attribute without a protocol whitelist in player/lua/ytdl_hook.lua. For example, an av://lavfi:ladspa=file= URL signifies that the product should call dlopen on a shared object file located at an arbitrary local pathname.
The issue exists because the product does not consider that youtube-dl can provide a potentially unsafe URL.

Solution

Update the affected package.

See Also

https://github.com/mpv-player/mpv/issues/5456

http://www.nessus.org/u?0f3a5ad9

Plugin Details

Severity: High

ID: 106734

File Name: freebsd_pkg_3ee6e5210d3211e899b0d017c2987f9a.nasl

Version: 3.4

Type: local

Published: 2/12/2018

Updated: 11/10/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mpv, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2/9/2018

Vulnerability Publication Date: 1/28/2018

Reference Information

CVE: CVE-2018-6360