VLC Media Player < 1.0.1 real_get_rdt_chunk() Function Overflow

High Nessus Plugin ID 40466


The remote Windows host contains an application that is affected by a buffer overflow vulnerability.


The version of VLC media player installed on the remote host is earlier than 1.0.1. Such versions contain an integer underflow involving the integer 'size' in the 'real_get_rdt_chunk_header()' function that can be triggered when reading Real Data Transport (RDT) chunk headers. This 'size' variable is used before the underflow to allocate storage on the heap and then after it to read an excessive amount of data from the network via the 'rtsp_read_data()' function, resulting in a buffer overflow. If an attacker can trick a user into opening a specially crafted RTSP stream with the affected application, arbitrary code could be executed, subject to the user's privileges.


Upgrade to VLC Media Player version 1.0.1 or later.

See Also



Plugin Details

Severity: High

ID: 40466

File Name: vlc_1_0_1.nasl

Version: $Revision: 1.8 $

Type: local

Agent: windows

Family: Windows

Published: 2009/08/01

Modified: 2016/11/15

Dependencies: 31852

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:videolan:vlc_media_player

Required KB Items: SMB/VLC/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/07/28

Vulnerability Publication Date: 2009/07/27

Reference Information

BID: 35821

OSVDB: 56604

Secunia: 36037