Lucene search

K
nessusTenable9266.PRM
HistoryMar 27, 2015 - 12:00 a.m.

VLC Media Player < 2.2.0 Multiple Vulnerabilities

2015-03-2700:00:00
Tenable
www.tenable.com
11

The remote host is running VLC 2.x prior to 2.2.0 and is affected by multiple vulnerabilities :

  • A buffer overflow exists in the VLC Update utility when handling overly large status files. Specifically, this affects the ‘GetUpdateFile()’ function in the source file ‘src/misc/update.c’. (CVE-2014-9625)
  • Multiple buffer overflow flaws exist in the mp4 demuxer due to improper parsing of string boxes. Specifically, these issues affect the ‘MP4_ReadBox_name()’ function in the source file ‘modules/demux/libmp4.c’. (CVE-2014-9626, CVE-2014-9627, CVE-2014-9628)
  • A buffer overflow exists in the Schroedinger encoder due to a flaw when calling ‘memcpy’. Specifically, this issue affects the ‘Encode()’ function in the source file ‘modules/codec/schroedinger.c’. Note: This issue also affects the Dirac encoder, which has been removed from VLC in version 2.1.6. (CVE-2014-9629)
  • A heap-based buffer overflow flaw occurs due to invalid write access while streaming OGG files over RTP. Specifically, this affects the ‘rtp_packetize_xiph_config()’ function in the source file ‘modules/stream_out/rtpfmt.c’. (CVE-2014-9630)
  • Overflow conditions exist in the Ogg, AVI, ASF, TTA, and MP4 demuxers that are triggered as user-supplied input is not properly validated. With a specially crafted media file, a context-dependent attacker can cause heap-based buffer overflows, potentially allowing the execution of arbitrary code.
  • An overflow condition exists in the ‘Ogg_DecodePacket()’ function in ‘modules/demux/ogg.c’. The issue is triggered as user-supplied input is not properly validated when handling packet header size. This may allow a context-dependent attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
  • An overflow condition exists that is triggered as user-supplied input is not properly validated when handling a WAV file. This may allow a context-dependent attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code. (CVE-2016-3941)
Binary data 9266.prm
VendorProductVersionCPE
videolanvlc_media_playercpe:/a:videolan:vlc_media_player