FreeBSD : vlc -- arbitrary code execution in the RealMedia processor (acf80afa-c3ef-11dd-a721-0030843d3802)

high Nessus Plugin ID 35056

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Tobias Klein from TrapKit reports :

The VLC media player contains an integer overflow vulnerability while parsing malformed RealMedia (.rm) files. The vulnerability leads to a heap overflow that can be exploited by a (remote) attacker to execute arbitrary code in the context of VLC media player.

Solution

Update the affected package.

See Also

http://www.trapkit.de/advisories/TKADV2008-013.txt

http://www.videolan.org/security/sa0811.html

http://www.nessus.org/u?a5463091

Plugin Details

Severity: High

ID: 35056

File Name: freebsd_pkg_acf80afac3ef11dda7210030843d3802.nasl

Version: 1.15

Type: local

Published: 12/8/2008

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:vlc-devel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/6/2008

Vulnerability Publication Date: 11/30/2008

Reference Information

CVE: CVE-2008-5276

BID: 32545

CWE: 189