FreeBSD : mpv -- arbitrary code execution via crafted website (3ee6e521-0d32-11e8-99b0-d017c2987f9a)

Medium Nessus Plugin ID 106734

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

mpv developers report :

mpv through 0.28.0 allows remote attackers to execute arbitrary code via a crafted website, because it reads HTML documents containing VIDEO elements, and accepts arbitrary URLs in a src attribute without a protocol whitelist in player/lua/ytdl_hook.lua. For example, an av://lavfi:ladspa=file= URL signifies that the product should call dlopen on a shared object file located at an arbitrary local pathname.
The issue exists because the product does not consider that youtube-dl can provide a potentially unsafe URL.

Solution

Update the affected package.

See Also

https://github.com/mpv-player/mpv/issues/5456

http://www.nessus.org/u?3c9de830

Plugin Details

Severity: Medium

ID: 106734

File Name: freebsd_pkg_3ee6e5210d3211e899b0d017c2987f9a.nasl

Version: $Revision: 3.3 $

Type: local

Published: 2018/02/12

Modified: 2018/02/26

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSSv3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:mpv, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2018/02/09

Vulnerability Publication Date: 2018/01/28

Reference Information

CVE: CVE-2018-6360