7.6 High
AI Score
Confidence
Low
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.951 High
EPSS
Percentile
99.3%
Multiple format string vulnerabilities in (1) the cdio_log_handler function in modules/access/cdda/access.c in the CDDA (libcdda_plugin) plugin, and the (2) cdio_log_handler and (3) vcd_log_handler functions in modules/access/vcdx/access.c in the VCDX (libvcdx_plugin) plugin, in VideoLAN VLC 0.7.0 through 0.8.6 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in an invalid URI, as demonstrated by a udp://-- URI in an M3U file.
landonf.bikemonkey.org/code/macosx/MOAB_Day_2.20070103045559.6753.timor.html
osvdb.org/31163
projects.info-pull.com/moab/MOAB-02-01-2007.html
secunia.com/advisories/23592
secunia.com/advisories/23829
secunia.com/advisories/23910
secunia.com/advisories/23971
security.gentoo.org/glsa/glsa-200701-24.xml
securitytracker.com/id?1017464
trac.videolan.org/vlc/changeset/18481
www.debian.org/security/2007/dsa-1252
www.novell.com/linux/security/advisories/2007_13_xine.html
www.securityfocus.com/bid/21852
www.via.ecp.fr/via/ml/vlc-devel/2007-01/msg00005.html
www.videolan.org/patches/vlc-0.8.6-MOAB-02-01-2007.patch
www.videolan.org/sa0701.html
www.vupen.com/english/advisories/2007/0026
applefun.blogspot.com/2007/01/moab-02-01-2007-vlc-media-player-udp.html
exchange.xforce.ibmcloud.com/vulnerabilities/31226
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14313