VLC Media Player < 1.1.7 Code Execution Vulnerability (deprecated)

High Nessus Network Monitor Plugin ID 5756

Synopsis

The remote host contains an application that allows arbitrary code execution.

Description

The remote host contains VLC player, a multi-media application.

Versions of VLC media player earlier than 1.1.7 are potentially affected by a code execution vulnerability due to insufficient input validation when parsing a specially crafted Matroska or WebM (MKV) file.

Solution

Upgrade to VLC Media Player version 1.1.7 or later.

See Also

http://www.videolan.org/security/sa1102.html

http://www.videolan.org/developers/vlc-branch/NEWS

Plugin Details

Severity: High

ID: 5756

File Name: 5756.prm

Family: Web Clients

Published: 2011/02/02

Modified: 2016/01/19

Dependencies: 1735, 8314

Nessus ID: 51851

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 2011/02/01

Vulnerability Publication Date: 2011/01/30

Exploitable With

Metasploit (VideoLAN VLC MKV Memory Corruption)

Reference Information

CVE: CVE-2011-0531

BID: 46060