Lucene search

K
saintSAINT CorporationSAINT:247793ED4A5F81141085F5CFD69DF3F9
HistoryJun 27, 2011 - 12:00 a.m.

VideoLAN VLC Media Player MKV Demuxer Code Execution

2011-06-2700:00:00
SAINT Corporation
download.saintcorporation.com
27

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%

Added: 06/27/2011
CVE: CVE-2011-0531
BID: 46060
OSVDB: 70698

Background

VLC media player is a media player supporting various audio and video formats for multiple platforms.

Problem

VideoLan VLC 1.1.6.1 and earlier are vulnerable to a remote code execution vulnerability as a result of insufficient input validation. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted **MKV** (**Matroska** or **WebM**) file.

Resolution

Upgrade to VLC media player 1.1.7 or higher. Patches for some older versions are also available.

References

<http://www.videolan.org/security/sa1102.html&gt;

Limitations

Exploit works on VideoLAN VLC 1.1.0.

The user must open the exploit file on the target with a vulnerable version of VLC.

Platforms

Windows

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%