VLC Media Player 2.x < 2.2.5 Multiple RCE

critical Nessus Network Monitor Plugin ID 700130

Synopsis

The remote host contains a media application that is affected by multiple Remote Code Execution (RCE) vectors.

Description

The remote host is running VLC 2.x prior to 2.2.5 and is affected by multiple RCE vulnerabilities :

- An overflow condition exists that is triggered as certain input is not properly validated. With a specially crafted AVI file, a context-dependent attacker can cause a heap-based buffer overflow, potentially allowing the execution of arbitrary code.
- An unspecified flaw exists that is triggered when handling LPCM in VOB files. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.

Solution

Upgrade to VLC Media Player 2.x version 2.2.5 or later.

See Also

https://trac.videolan.org/vlc/ticket/17448

Plugin Details

Severity: Critical

ID: 700130

Family: Web Clients

Published: 6/7/2017

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 9.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:videolan:vlc_media_player

Patch Publication Date: 8/29/2016

Vulnerability Publication Date: 8/29/2016