Lucene search

K
debianDebianDEBIAN:DLA-3679-1:D0708
HistoryNov 30, 2023 - 11:55 p.m.

[SECURITY] [DLA 3679-1] vlc security update

2023-11-3023:55:58
lists.debian.org
6
cve-2023-47359
heap buffer overflow
cve-2023-47360
mmsh module
debian lts
integer underflow
security update
vlc

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.6%


Debian LTS Advisory DLA-3679-1 [email protected]
https://www.debian.org/lts/security/ Adrian Bunk
November 30, 2023 https://wiki.debian.org/LTS


Package : vlc
Version : 3.0.20-0+deb10u1
CVE ID : CVE-2023-47359 CVE-2023-47360

Two vulnerabilities in the MMS over HTTP protocol have been fixed in the
VLC media player, which has also been upgraded to the latest upstream version.

CVE-2023-47359

Heap buffer overflow in the MMSH module.

CVE-2023-47360

Integer underflow in the MMSH module.

For Debian 10 buster, these problems have been fixed in version
3.0.20-0+deb10u1.

We recommend that you upgrade your vlc packages.

For the detailed security status of vlc please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/vlc

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.6%