FreeBSD : vlc -- Multiple vulnerabilities fixed in VLC media player (4a10902f-8a48-11ea-8668-e0d55e2a8bf9)

high Nessus Plugin ID 136159


New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote FreeBSD host is missing a security-related update.


VideoLAN reports : Details A remote user could :

- Create a specifically crafted image file that could trigger an out of bounds read

- Send a specifically crafter request to the microdns service discovery, potentially triggering various memory management issues Impact

If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.

We have not seen exploits performing code execution through these vulnerabilities

CVE-2019-19721 affects VLC 3.0.8 and earlier, and only reads 1 byte out of bound


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 136159

File Name: freebsd_pkg_4a10902f8a4811ea8668e0d55e2a8bf9.nasl

Version: 1.3

Type: local

Published: 4/30/2020

Updated: 2/19/2021

Dependencies: ssh_get_info.nasl

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:vlc, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/29/2020

Vulnerability Publication Date: 4/1/2020

Reference Information

IAVB: 2020-B-0025-S