Lucene search

K
debianDebianDEBIAN:DLA-3216-1:134C2
HistoryDec 02, 2022 - 11:11 p.m.

[SECURITY] [DLA 3216-1] vlc security update

2022-12-0223:11:31
lists.debian.org
14
vlc
buffer overflow
security update
debian 10 buster

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.5%


Debian LTS Advisory DLA-3216-1 [email protected]
https://www.debian.org/lts/security/ Utkarsh Gupta
December 03, 2022 https://wiki.debian.org/LTS


Package : vlc
Version : 3.0.17.4-0+deb10u2
CVE ID : CVE-2022-41325

Mitsurugi Heishiro found out that in VLC, multimedia player and streamer,
a potential buffer overflow in the vnc module could trigger remote code
execution if a malicious vnc URL is deliberately played.

For Debian 10 buster, this problem has been fixed in version
3.0.17.4-0+deb10u2.

We recommend that you upgrade your vlc packages.

For the detailed security status of vlc please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/vlc

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

34.5%