An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability.
{"talos": [{"lastseen": "2023-06-06T15:34:54", "description": "### Summary\n\nAn exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the `rr_decode` function\u2019s return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability.\n\n### Tested Versions\n\nVideolabs libmicrodns 0.1.0\n\n### Product URLs\n\n<https://github.com/videolabs/libmicrodns>\n\n### CVSSv3 Score\n\n9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\n\n### CWE\n\nCWE-252: Unchecked Return Value\n\n### Details\n\nThe libmicrodns library is an mDNS resolver that aims to be simple and compatible cross-platform.\n\nThe function `mdns_recv` reads and parses an mDNS message:\n \n \n static int\n mdns_recv(const struct mdns_conn* conn, struct mdns_hdr *hdr, struct rr_entry **entries)\n {\n uint8_t buf[MDNS_PKT_MAXSZ];\n size_t num_entry, n;\n ssize_t length;\n struct rr_entry *entry;\n \n *entries = NULL;\n if ((length = recv(conn->sock, (char *) buf, sizeof(buf), 0)) < 0) // [1]\n return (MDNS_NETERR);\n \n const uint8_t *ptr = mdns_read_header(buf, length, hdr); // [2]\n n = length;\n \n num_entry = hdr->num_qn + hdr->num_ans_rr + hdr->num_add_rr;\n for (size_t i = 0; i < num_entry; ++i) {\n entry = calloc(1, sizeof(struct rr_entry));\n if (!entry)\n goto err;\n ptr = rr_read(ptr, &n, buf, entry, i >= hdr->num_qn); // [3]\n if (!ptr) {\n free(entry);\n errno = ENOSPC;\n goto err;\n }\n entry->next = *entries;\n *entries = entry;\n }\n ...\n }\n \n\nAt [1], a message is read from the network. The 12-bytes mDNS header is then parsed at [2]. Based on the header info, the loop parses each resource record (\u201cRR\u201d) using the function `rr_read` [3], which in turn calls `rr_read_RR` and then `rr_decode`.\n \n \n #define advance(x) ptr += x; *n -= x\n \n /*\n * Decodes a DN compressed format (RFC 1035)\n * e.g \"\\x03foo\\x03bar\\x00\" gives \"foo.bar\"\n */\n static const uint8_t *\n rr_decode(const uint8_t *ptr, size_t *n, const uint8_t *root, char **ss)\n {\n char *s;\n \n s = *ss = malloc(MDNS_DN_MAXSZ);\n if (!s)\n return (NULL);\n \n if (*ptr == 0) {\n *s = '\\0';\n advance(1);\n return (ptr);\n }\n while (*ptr) { // [4]\n size_t free_space;\n uint16_t len;\n \n free_space = *ss + MDNS_DN_MAXSZ - s;\n len = *ptr; // [8]\n advance(1);\n \n /* resolve the offset of the pointer (RFC 1035-4.1.4) */\n if ((len & 0xC0) == 0xC0) { // [5]\n const uint8_t *p;\n char *buf;\n size_t m;\n \n if (*n < sizeof(len)) // [9]\n goto err;\n len &= ~0xC0;\n len = (len << 8) | *ptr;\n advance(1);\n \n p = root + len;\n m = ptr - p + *n; // [6]\n rr_decode(p, &m, root, &buf); // [7]\n if (free_space <= strlen(buf)) { // [10]\n free(buf); // [12]\n goto err;\n }\n (void) strcpy(s, buf);\n free(buf); // [13]\n return (ptr);\n }\n if (*n <= len || free_space <= len) // [11]\n goto err;\n strncpy(s, (const char *) ptr, len);\n advance(len);\n s += len;\n *s++ = (*ptr) ? '.' : '\\0';\n }\n advance(1);\n return (ptr);\n err:\n free(*ss);\n return (NULL);\n }\n \n\nThe function `rr_decode` expects 4 parameters:\n\n * `ptr`: the pointer to the start of the label to parse\n * `n`: the number of remaining bytes in the message, starting from ptr\n * `root`: the pointer to the start of the mDNS message\n * `ss`: buffer used to build the domain name\n\nAt [4] the function loops for each character in the label and, if a pointer is found [5], the pointed label location and its maximum size is computed at [6], and the `rr_decode` function is called recursively [7]. \nFrom this point, the function `rr_decode` could reach the `err` label in 3 different ways:\n\n * by having a compressed label and `*n < sizeof(len)` [9], that is having `*n == 0 || *n == 1`.\n * by having a compressed label with size bigger than the free space available [10].\n * by having `*n < len` (i.e. the label size is bigger than the remaining space in the message) or `free_space <= len` (i.e. the label size is bigger or equal to the remaining space in the `*ss` buffer) [11].\n\nWhen any of those 3 cases are triggered, the code jumps to the `err` label, which frees the `*ss` buffer previously allocated, and returns `NULL`. \nHowever, when the function returns at [7], the `NULL` value returned is not checked, possibly leading to a double-free of the `buf` (`*ss`) buffer at [12] or [13], which could later be exploited by an attacker to execute arbitrary code.\n\n### Timeline\n\n2020-01-30 - Vendor Disclosure \n2020-03-20 - Vendor Patched \n2020-03-23 - Public Release\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-03-23T00:00:00", "type": "talos", "title": "Videolabs libmicrodns 0.1.0 rr_decode return value remote code execution vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-6072"], "modified": "2020-03-23T00:00:00", "id": "TALOS-2020-0995", "href": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-0995", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2023-06-06T14:57:22", "description": "An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-03-24T21:15:00", "type": "cve", "title": "CVE-2020-6072", "cwe": ["CWE-415"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-6072"], "modified": "2022-06-03T18:16:00", "cpe": ["cpe:/o:debian:debian_linux:9.0", "cpe:/a:videolabs:libmicrodns:0.1.0"], "id": "CVE-2020-6072", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6072", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:videolabs:libmicrodns:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]}], "ubuntucve": [{"lastseen": "2023-07-28T02:37:56", "description": "An exploitable code execution vulnerability exists in the label-parsing\nfunctionality of Videolabs libmicrodns 0.1.0. When parsing compressed\nlabels in mDNS messages, the rr_decode function's return value is not\nchecked, leading to a double free that could be exploited to execute\narbitrary code. An attacker can send an mDNS message to trigger this\nvulnerability.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-03-24T00:00:00", "type": "ubuntucve", "title": "CVE-2020-6072", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-6072"], "modified": "2020-03-24T00:00:00", "id": "UB:CVE-2020-6072", "href": "https://ubuntu.com/security/CVE-2020-6072", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debiancve": [{"lastseen": "2023-09-09T02:44:01", "description": "An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability.", "cvss3": {}, "published": "2020-03-24T21:15:00", "type": "debiancve", "title": "CVE-2020-6072", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2020-6072"], "modified": "2020-03-24T21:15:00", "id": "DEBIANCVE:CVE-2020-6072", "href": "https://security-tracker.debian.org/tracker/CVE-2020-6072", "cvss": {"score": 0.0, "vector": "NONE"}}], "veracode": [{"lastseen": "2022-07-26T13:35:06", "description": "An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns . When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-08-06T21:40:01", "type": "veracode", "title": "Remote Code Execution (RCE)", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-6072"], "modified": "2022-06-03T20:21:04", "id": "VERACODE:26272", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-26272/summary", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "kaspersky": [{"lastseen": "2023-06-06T15:25:24", "description": "### *Detect date*:\n04/29/2020\n\n### *Severity*:\nWarning\n\n### *Description*:\nMultiple vulnerabilities were found in VLC media player. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code.\n\n### *Affected products*:\nVLC media player version 3.0.0 to 3.0.8\n\n### *Solution*:\nUpdate to the latest version \n[Download VLC media player](<http://www.videolan.org/vlc/index.html>)\n\n### *Original advisories*:\n[sb-vlc309](<https://www.videolan.org/security/sb-vlc309.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[VLC media player](<https://threats.kaspersky.com/en/product/VLC-media-player/>)\n\n### *CVE-IDS*:\n[CVE-2020-6071](<https://vulners.com/cve/CVE-2020-6071>)5.0Critical \n[CVE-2020-6072](<https://vulners.com/cve/CVE-2020-6072>)7.5Critical \n[CVE-2020-6073](<https://vulners.com/cve/CVE-2020-6073>)5.0Critical \n[CVE-2020-6077](<https://vulners.com/cve/CVE-2020-6077>)5.0Critical \n[CVE-2020-6078](<https://vulners.com/cve/CVE-2020-6078>)5.0Critical \n[CVE-2020-6079](<https://vulners.com/cve/CVE-2020-6079>)5.0Critical", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-04-29T00:00:00", "type": "kaspersky", "title": "KLA11759 Multiple vulnerabilities in VLC media player", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-6071", "CVE-2020-6072", "CVE-2020-6073", "CVE-2020-6077", "CVE-2020-6078", "CVE-2020-6079"], "modified": "2020-06-03T00:00:00", "id": "KLA11759", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11759/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "archlinux": [{"lastseen": "2023-06-06T15:10:28", "description": "Arch Linux Security Advisory ASA-202004-24\n==========================================\n\nSeverity: Critical\nDate : 2020-04-30\nCVE-ID : CVE-2020-6071 CVE-2020-6072 CVE-2020-6073 CVE-2020-6077\nCVE-2020-6078 CVE-2020-6079 CVE-2020-6080\nPackage : libmicrodns\nType : multiple issues\nRemote : Yes\nLink : https://security.archlinux.org/AVG-1136\n\nSummary\n=======\n\nThe package libmicrodns before version 0.1.2-1 is vulnerable to\nmultiple issues including arbitrary code execution, denial of service\nand information disclosure.\n\nResolution\n==========\n\nUpgrade to 0.1.2-1.\n\n# pacman -Syu \"libmicrodns>=0.1.2-1\"\n\nThe problems have been fixed upstream in version 0.1.2.\n\nWorkaround\n==========\n\nNone.\n\nDescription\n===========\n\n- CVE-2020-6071 (denial of service)\n\nAn exploitable denial-of-service vulnerability exists in the resource\nrecord-parsing functionality of Videolabs libmicrodns 0.1.0. When\nparsing compressed labels in mDNS messages, the compression pointer is\nfollowed without checking for recursion, leading to a denial of\nservice. An attacker can send an mDNS message to trigger this\nvulnerability.\n\n- CVE-2020-6072 (arbitrary code execution)\n\nAn exploitable code execution vulnerability exists in the label-parsing\nfunctionality of Videolabs libmicrodns 0.1.0. When parsing compressed\nlabels in mDNS messages, the rr_decode function's return value is not\nchecked, leading to a double free that could be exploited to execute\narbitrary code. An attacker can send an mDNS message to trigger this\nvulnerability.\n\n- CVE-2020-6073 (information disclosure)\n\nAn exploitable denial-of-service vulnerability exists in the TXT\nrecord-parsing functionality of Videolabs libmicrodns 0.1.0. When\nparsing the RDATA section in a TXT record in mDNS messages, multiple\ninteger overflows can be triggered, leading to a denial of service. An\nattacker can send an mDNS message to trigger this vulnerability.\n\n- CVE-2020-6077 (information disclosure)\n\nAn exploitable denial-of-service vulnerability exists in the message-\nparsing functionality of Videolabs libmicrodns 0.1.0. When parsing mDNS\nmessages, the implementation does not properly keep track of the\navailable data in the message, possibly leading to an out-of-bounds\nread that would result in a denial of service. An attacker can send an\nmDNS message to trigger this vulnerability.\n\n- CVE-2020-6078 (denial of service)\n\nAn exploitable denial-of-service vulnerability exists in the message-\nparsing functionality of Videolabs libmicrodns 0.1.0. When parsing mDNS\nmessages in mdns_recv, the return value of the mdns_read_header\nfunction is not checked, leading to an uninitialized variable usage\nthat eventually results in a null pointer dereference, leading to\nservice crash. An attacker can send a series of mDNS messages to\ntrigger this vulnerability.\n\n- CVE-2020-6079 (denial of service)\n\nMultiple exploitable denial-of-service vulnerabilities exist in the\nresource allocation handling of Videolabs libmicrodns 0.1.0. When\nencountering errors while parsing mDNS messages, some allocated data is\nnot freed, possibly leading to a denial-of-service condition via\nresource exhaustion. An attacker can send one mDNS message repeatedly\nto trigger these vulnerabilities.\n\n- CVE-2020-6080 (denial of service)\n\nMultiple exploitable denial-of-service vulnerabilities exist in the\nresource allocation handling of Videolabs libmicrodns 0.1.0. When\nencountering errors while parsing mDNS messages, some allocated data is\nnot freed, possibly leading to a denial-of-service condition via\nresource exhaustion. An attacker can send one mDNS message repeatedly\nto trigger these vulnerabilities.\n\nImpact\n======\n\nA remote attacker can provide crafted DNS responses to crash the\nservice, disclose data or execute arbitrary code.\n\nReferences\n==========\n\nhttps://github.com/videolabs/libmicrodns/releases/tag/0.1.1\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-0994\nhttps://github.com/videolabs/libmicrodns/commit/0103f40371cd6e5f034d1ea5674cd33316fef518\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-0995\nhttps://github.com/videolabs/libmicrodns/commit/219b180c3cea9ad674a5512412fbd75592f61aa7\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-0996\nhttps://github.com/videolabs/libmicrodns/commit/f0e8a723ef2d0a7ef9e200a8fd7c561d4695c5cf\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1000\nhttps://github.com/videolabs/libmicrodns/commit/80860fad7e046959b730a0e37fd8d6ad955682ec\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1001\nhttps://github.com/videolabs/libmicrodns/commit/4fb18284bea9a4f5eaf7745d72965b9b24e27d61\nhttps://talosintelligence.com/vulnerability_reports/TALOS-2020-1002\nhttps://github.com/videolabs/libmicrodns/commit/9768bdbeb8ea6b7849a97af4362d1b5184352cee\nhttps://security.archlinux.org/CVE-2020-6071\nhttps://security.archlinux.org/CVE-2020-6072\nhttps://security.archlinux.org/CVE-2020-6073\nhttps://security.archlinux.org/CVE-2020-6077\nhttps://security.archlinux.org/CVE-2020-6078\nhttps://security.archlinux.org/CVE-2020-6079\nhttps://security.archlinux.org/CVE-2020-6080", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-04-30T00:00:00", "type": "archlinux", "title": "[ASA-202004-24] libmicrodns: multiple issues", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-6071", "CVE-2020-6072", "CVE-2020-6073", "CVE-2020-6077", "CVE-2020-6078", "CVE-2020-6079", "CVE-2020-6080"], "modified": "2020-04-30T00:00:00", "id": "ASA-202004-24", "href": "https://security.archlinux.org/ASA-202004-24", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2023-06-06T15:25:16", "description": "### Background\n\nlibmicrodns is an mDNS library, focused on being simple and cross-platform. \n\n### Description\n\nMultiple vulnerabilities have been discovered in libmicrodns. Please review the CVE identifiers and the upstream advisory referenced below for details. \n\n### Impact\n\nPlease review the referenced CVE identifiers for details.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll libmicrodns users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-libs/libmicrodns-0.1.2\"", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-14T00:00:00", "type": "gentoo", "title": "libmicrodns: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-6071", "CVE-2020-6072", "CVE-2020-6073", "CVE-2020-6077", "CVE-2020-6078", "CVE-2020-6079", "CVE-2020-6080"], "modified": "2020-05-14T00:00:00", "id": "GLSA-202005-10", "href": "https://security.gentoo.org/glsa/202005-10", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2020-05-06T01:15:50", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-05-02T00:00:00", "type": "openvas", "title": "Debian: Security Advisory for vlc (DSA-4671-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-6071", "CVE-2020-6077", "CVE-2020-6073", "CVE-2020-6080", "CVE-2020-6078", "CVE-2020-6079", "CVE-2020-6072"], "modified": "2020-05-02T00:00:00", "id": "OPENVAS:1361412562310704671", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704671", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704671\");\n script_version(\"2020-05-02T03:00:23+0000\");\n script_cve_id(\"CVE-2020-6071\", \"CVE-2020-6072\", \"CVE-2020-6073\", \"CVE-2020-6077\", \"CVE-2020-6078\", \"CVE-2020-6079\", \"CVE-2020-6080\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-05-02 03:00:23 +0000 (Sat, 02 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-02 03:00:23 +0000 (Sat, 02 May 2020)\");\n script_name(\"Debian: Security Advisory for vlc (DSA-4671-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(9|10)\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2020/dsa-4671.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4671-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'vlc'\n package(s) announced via the DSA-4671-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple security issues were discovered in the microdns plugin of the\nVLC media player, which could result in denial of service or potentially\nthe execution of arbitrary code via malicious mDNS packets.\");\n\n script_tag(name:\"affected\", value:\"'vlc' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the oldstable distribution (stretch), these problems have been fixed\nin version 3.0.10-0+deb9u1. This update disables the microdns plugin.\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 3.0.10-0+deb10u1. This update disables the microdns plugin.\n\nWe recommend that you upgrade your vlc packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libvlc-bin\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libvlc-dev\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libvlc5\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libvlccore-dev\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libvlccore9\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-bin\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-data\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-l10n\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-nox\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-access-extra\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-base\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-fluidsynth\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-jack\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-notify\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-qt\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-samba\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-skins2\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-svg\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-video-output\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-video-splitter\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-visualization\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-zvbi\", ver:\"3.0.10-0+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libvlc-bin\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libvlc-dev\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libvlc5\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libvlccore-dev\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libvlccore9\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-bin\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-data\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-l10n\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-access-extra\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-base\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-fluidsynth\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-jack\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-notify\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-qt\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-samba\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-skins2\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-svg\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-video-output\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-video-splitter\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-visualization\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"vlc-plugin-zvbi\", ver:\"3.0.10-0+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-08-30T15:37:26", "description": "The remote host is affected by the vulnerability described in GLSA-202005-10 (libmicrodns: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in libmicrodns. Please review the CVE identifiers and the upstream advisory referenced below for details.\n Impact :\n\n Please review the referenced CVE identifiers for details.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {}, "published": "2020-05-15T00:00:00", "type": "nessus", "title": "GLSA-202005-10 : libmicrodns: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-6071", "CVE-2020-6072", "CVE-2020-6073", "CVE-2020-6077", "CVE-2020-6078", "CVE-2020-6079", "CVE-2020-6080"], "modified": "2021-02-19T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:libmicrodns", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-202005-10.NASL", "href": "https://www.tenable.com/plugins/nessus/136640", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 202005-10.\n#\n# The advisory text is Copyright (C) 2001-2020 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(136640);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/19\");\n\n script_cve_id(\"CVE-2020-6071\", \"CVE-2020-6072\", \"CVE-2020-6073\", \"CVE-2020-6077\", \"CVE-2020-6078\", \"CVE-2020-6079\", \"CVE-2020-6080\");\n script_xref(name:\"GLSA\", value:\"202005-10\");\n script_xref(name:\"IAVB\", value:\"2020-B-0025-S\");\n\n script_name(english:\"GLSA-202005-10 : libmicrodns: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-202005-10\n(libmicrodns: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in libmicrodns. Please\n review the CVE identifiers and the upstream advisory referenced below for\n details.\n \nImpact :\n\n Please review the referenced CVE identifiers for details.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.videolan.org/security/sb-vlc309.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/202005-10\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All libmicrodns users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-libs/libmicrodns-0.1.2'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:libmicrodns\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/03/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/15\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-libs/libmicrodns\", unaffected:make_list(\"ge 0.1.2\"), vulnerable:make_list(\"lt 0.1.2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libmicrodns\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-08-30T15:32:45", "description": "Multiple security issues were discovered in the microdns plugin of the VLC media player, which could result in denial of service or potentially the execution of arbitrary code via malicious mDNS packets.", "cvss3": {}, "published": "2020-05-04T00:00:00", "type": "nessus", "title": "Debian DSA-4671-1 : vlc - security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-6071", "CVE-2020-6072", "CVE-2020-6073", "CVE-2020-6077", "CVE-2020-6078", "CVE-2020-6079", "CVE-2020-6080"], "modified": "2021-02-19T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:vlc", "cpe:/o:debian:debian_linux:10.0", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4671.NASL", "href": "https://www.tenable.com/plugins/nessus/136291", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4671. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(136291);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/19\");\n\n script_cve_id(\"CVE-2020-6071\", \"CVE-2020-6072\", \"CVE-2020-6073\", \"CVE-2020-6077\", \"CVE-2020-6078\", \"CVE-2020-6079\", \"CVE-2020-6080\");\n script_xref(name:\"DSA\", value:\"4671\");\n script_xref(name:\"IAVB\", value:\"2020-B-0025-S\");\n\n script_name(english:\"Debian DSA-4671-1 : vlc - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple security issues were discovered in the microdns plugin of the\nVLC media player, which could result in denial of service or\npotentially the execution of arbitrary code via malicious mDNS\npackets.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/vlc\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/vlc\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/buster/vlc\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2020/dsa-4671\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the vlc packages.\n\nFor the oldstable distribution (stretch), these problems have been\nfixed in version 3.0.10-0+deb9u1. This update disables the microdns\nplugin.\n\nFor the stable distribution (buster), these problems have been fixed\nin version 3.0.10-0+deb10u1. This update disables the microdns plugin.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:vlc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:10.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/03/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/04\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"10.0\", prefix:\"libvlc-bin\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libvlc-dev\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libvlc5\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libvlccore-dev\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"libvlccore9\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-bin\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-data\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-l10n\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-access-extra\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-base\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-fluidsynth\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-jack\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-notify\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-qt\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-samba\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-skins2\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-svg\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-video-output\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-video-splitter\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-visualization\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"10.0\", prefix:\"vlc-plugin-zvbi\", reference:\"3.0.10-0+deb10u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libvlc-bin\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libvlc-dev\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libvlc5\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libvlccore-dev\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libvlccore8\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-bin\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-data\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-l10n\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-nox\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-access-extra\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-base\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-fluidsynth\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-jack\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-notify\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-qt\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-samba\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-sdl\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-skins2\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-svg\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-video-output\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-video-splitter\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-visualization\", reference:\"3.0.10-0+deb9u1\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"vlc-plugin-zvbi\", reference:\"3.0.10-0+deb9u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-08-30T15:33:12", "description": "The version of VLC media player installed on the remote Windows host is prior to 3.0.9. It is, therefore, affected by multiple vulnerabilities:\n\n - An exploitable denial-of-service vulnerability exists in the resource record-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the compression pointer is followed without checking for recursion, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability (CVE-2020-6071). \n\n - An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this vulnerability (CVE-2020-6072).\n\n - An exploitable denial-of-service vulnerability exists in the TXT record-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing the RDATA section in a TXT record in mDNS messages, multiple integer overflows can be triggered, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability (CVE-2020-6073).\n\n - An exploitable denial-of-service vulnerability exists in the message-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing mDNS messages, the implementation does not properly keep track of the available data in the message, possibly leading to an out-of-bounds read that would result in a denial of service. An attacker can send an mDNS message to trigger this vulnerability (CVE-2020-6077).\n\n - An exploitable denial-of-service vulnerability exists in the message-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing mDNS messages in mdns_recv, the return value of the mdns_read_header function is not checked, leading to an uninitialized variable usage that eventually results in a null pointer dereference, leading to service crash. An attacker can send a series of mDNS messages to trigger this vulnerability (CVE-2020-6078).\n\n - An exploitable denial-of-service vulnerability exists in the resource allocation handling of Videolabs libmicrodns 0.1.0. When encountering errors while parsing mDNS messages, some allocated data is not freed, possibly leading to a denial-of-service condition via resource exhaustion. An attacker can send one mDNS message repeatedly to trigger this vulnerability through decoding of the domain name performed by rr_decode (CVE-2020-6079).", "cvss3": {}, "published": "2020-05-08T00:00:00", "type": "nessus", "title": "VLC < 3.0.9 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19721", "CVE-2020-6071", "CVE-2020-6072", "CVE-2020-6073", "CVE-2020-6077", "CVE-2020-6078", "CVE-2020-6079"], "modified": "2021-02-19T00:00:00", "cpe": ["cpe:/a:videolan:vlc_media_player"], "id": "VLC_3_0_9.NASL", "href": "https://www.tenable.com/plugins/nessus/136422", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(136422);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/19\");\n\n script_cve_id(\n \"CVE-2019-19721\",\n \"CVE-2020-6071\",\n \"CVE-2020-6072\",\n \"CVE-2020-6073\",\n \"CVE-2020-6077\",\n \"CVE-2020-6078\",\n \"CVE-2020-6079\"\n );\n script_xref(name:\"IAVB\", value:\"2020-B-0025-S\");\n\n script_name(english:\"VLC < 3.0.9 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a media player that is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of VLC media player installed on the remote Windows host is prior to 3.0.9. It is, therefore, affected by \nmultiple vulnerabilities:\n\n - An exploitable denial-of-service vulnerability exists in the resource record-parsing functionality of Videolabs \n libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the compression pointer is followed without checking \n for recursion, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability \n (CVE-2020-6071). \n\n - An exploitable code execution vulnerability exists in the label-parsing functionality of Videolabs libmicrodns 0.1.0. \n When parsing compressed labels in mDNS messages, the rr_decode function's return value is not checked, leading to a \n double free that could be exploited to execute arbitrary code. An attacker can send an mDNS message to trigger this \n vulnerability (CVE-2020-6072).\n\n - An exploitable denial-of-service vulnerability exists in the TXT record-parsing functionality of Videolabs libmicrodns 0.1.0. \n When parsing the RDATA section in a TXT record in mDNS messages, multiple integer overflows can be triggered, leading to a denial \n of service. An attacker can send an mDNS message to trigger this vulnerability (CVE-2020-6073).\n\n - An exploitable denial-of-service vulnerability exists in the message-parsing functionality of Videolabs libmicrodns 0.1.0. \n When parsing mDNS messages, the implementation does not properly keep track of the available data in the message, possibly leading \n to an out-of-bounds read that would result in a denial of service. An attacker can send an mDNS message to trigger this \n vulnerability (CVE-2020-6077).\n\n - An exploitable denial-of-service vulnerability exists in the message-parsing functionality of Videolabs libmicrodns 0.1.0. \n When parsing mDNS messages in mdns_recv, the return value of the mdns_read_header function is not checked, leading to an uninitialized \n variable usage that eventually results in a null pointer dereference, leading to service crash. An attacker can send a series of \n mDNS messages to trigger this vulnerability (CVE-2020-6078).\n\n - An exploitable denial-of-service vulnerability exists in the resource allocation handling of Videolabs libmicrodns 0.1.0. \n When encountering errors while parsing mDNS messages, some allocated data is not freed, possibly leading to a denial-of-service \n condition via resource exhaustion. An attacker can send one mDNS message repeatedly to trigger this vulnerability through decoding \n of the domain name performed by rr_decode (CVE-2020-6079).\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.videolan.org/security/sb-vlc309.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to VLC version 3.0.9 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-6072\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/03/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/03/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:videolan:vlc_media_player\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"vlc_installed.nasl\");\n script_require_keys(\"SMB/VLC/Version\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\napp_info = vcf::get_app_info(app:'VLC media player', win_local:TRUE);\n\nconstraints = [{'fixed_version':'3.0.9'}];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "debian": [{"lastseen": "2023-07-17T15:18:27", "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4671-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nApril 30, 2020 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : vlc\nCVE ID : CVE-2020-6071 CVE-2020-6072 CVE-2020-6073 CVE-2020-6077 \n CVE-2020-6078 CVE-2020-6079 CVE-2020-6080\n\nMultiple security issues were discovered in the microdns plugin of the\nVLC media player, which could result in denial of service or potentially\nthe execution of arbitrary code via malicious mDNS packets.\n\nFor the oldstable distribution (stretch), these problems have been fixed\nin version 3.0.10-0+deb9u1. This update disables the microdns plugin.\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 3.0.10-0+deb10u1. This update disables the microdns plugin.\n\nWe recommend that you upgrade your vlc packages.\n\nFor the detailed security status of vlc please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/vlc\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-04-30T20:48:04", "type": "debian", "title": "[SECURITY] [DSA 4671-1] vlc security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-6071", "CVE-2020-6072", "CVE-2020-6073", "CVE-2020-6077", "CVE-2020-6078", "CVE-2020-6079", "CVE-2020-6080"], "modified": "2020-04-30T20:48:04", "id": "DEBIAN:DSA-4671-1:D12B2", "href": "https://lists.debian.org/debian-security-announce/2020/msg00074.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "osv": [{"lastseen": "2022-08-10T07:15:31", "description": "\nMultiple security issues were discovered in the microdns plugin of the\nVLC media player, which could result in denial of service or potentially\nthe execution of arbitrary code via malicious mDNS packets.\n\n\nFor the oldstable distribution (stretch), these problems have been fixed\nin version 3.0.10-0+deb9u1. This update disables the microdns plugin.\n\n\nFor the stable distribution (buster), these problems have been fixed in\nversion 3.0.10-0+deb10u1. This update disables the microdns plugin.\n\n\nWe recommend that you upgrade your vlc packages.\n\n\nFor the detailed security status of vlc please refer to\nits security tracker page at:\n[\\\nhttps://security-tracker.debian.org/tracker/vlc](https://security-tracker.debian.org/tracker/vlc)\n\n\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-04-30T00:00:00", "type": "osv", "title": "vlc - security update", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-6071", "CVE-2020-6077", "CVE-2020-6073", "CVE-2020-6080", "CVE-2020-6078", "CVE-2020-6079", "CVE-2019-19721", "CVE-2020-6072"], "modified": "2022-08-10T07:15:27", "id": "OSV:DSA-4671-1", "href": "https://osv.dev/vulnerability/DSA-4671-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "mageia": [{"lastseen": "2023-06-13T15:33:08", "description": "Multiple security issues were discovered in the microdns plugin of the VLC media player, which could result in denial of service or potentially the execution of arbitrary code via malicious mDNS packets (CVE-2020-6071, CVE-2020-6072, CVE-2020-6073, CVE-2020-6077, CVE-2020-6078, CVE-2020-6079, CVE-2020-6080). VLC has been updated to 3.0.10 to fix theese and other issues. \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-08T10:57:54", "type": "mageia", "title": "Updated vlc packages fix security vulnerabilities\n", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19721", "CVE-2020-6071", "CVE-2020-6072", "CVE-2020-6073", "CVE-2020-6077", "CVE-2020-6078", "CVE-2020-6079", "CVE-2020-6080"], "modified": "2020-05-08T10:57:54", "id": "MGASA-2020-0203", "href": "https://advisories.mageia.org/MGASA-2020-0203.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}