Search criteria

38 vulnerabilities found for VLC by VideoLAN

CVE-2017-8310 (GCVE-0-2017-8310)

Vulnerability from cvelistv5 – Published: 2017-05-23 21:00 – Updated: 2024-08-05 16:34
VLAI?
Summary
Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file.
Severity ?
No CVSS data available.
CWE
  • Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)
Assigner
References
https://security.gentoo.org/glsa/201707-10 vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/98638 vdb-entryx_refsource_BID
http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=bl… x_refsource_CONFIRM
http://www.debian.org/security/2017/dsa-3899 vendor-advisoryx_refsource_DEBIAN
Impacted products
Vendor Product Version
VideoLAN VLC Affected: 2.2.*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:21.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "98638",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98638"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=blobdiff%3Bf=modules/codec/subsdec.c%3Bh=addd8c71f30d53558fffd19059b374be45cf0f8e%3Bhp=1b4276e299a2a6668047231d29ac705ae93076ba%3Bhb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328%3Bhpb=3477dba3d506de8d95bccef2c6b67861188f6c29"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "2.2.*"
            }
          ]
        }
      ],
      "datePublic": "2017-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "98638",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98638"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=blobdiff%3Bf=modules/codec/subsdec.c%3Bh=addd8c71f30d53558fffd19059b374be45cf0f8e%3Bhp=1b4276e299a2a6668047231d29ac705ae93076ba%3Bhb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328%3Bhpb=3477dba3d506de8d95bccef2c6b67861188f6c29"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8310",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.2.*"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "98638",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98638"
            },
            {
              "name": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=blobdiff;f=modules/codec/subsdec.c;h=addd8c71f30d53558fffd19059b374be45cf0f8e;hp=1b4276e299a2a6668047231d29ac705ae93076ba;hb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328;hpb=3477dba3d506de8d95bccef2c6b67861188f6c29",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=blobdiff;f=modules/codec/subsdec.c;h=addd8c71f30d53558fffd19059b374be45cf0f8e;hp=1b4276e299a2a6668047231d29ac705ae93076ba;hb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328;hpb=3477dba3d506de8d95bccef2c6b67861188f6c29"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8310",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:21.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8311 (GCVE-0-2017-8311)

Vulnerability from cvelistv5 – Published: 2017-05-23 21:00 – Updated: 2024-08-05 16:34
VLAI?
Summary
Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file.
Severity ?
No CVSS data available.
CWE
  • Allows attacker to execute arbitrary code.
Assigner
References
https://security.gentoo.org/glsa/201707-10 vendor-advisoryx_refsource_GENTOO
https://www.exploit-db.com/exploits/44514/ exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/98634 vdb-entryx_refsource_BID
http://git.videolan.org/?p=vlc.git%3Ba=commitdiff… x_refsource_CONFIRM
http://www.debian.org/security/2017/dsa-3899 vendor-advisoryx_refsource_DEBIAN
Impacted products
Vendor Product Version
VideoLAN VLC Affected: <2.2.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:22.584Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "44514",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/44514/"
          },
          {
            "name": "98634",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98634"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=775de716add17322f24b476439f903a829446eb6"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c2.2.5"
            }
          ]
        }
      ],
      "datePublic": "2017-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to execute arbitrary code.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-26T09:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "44514",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/44514/"
        },
        {
          "name": "98634",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98634"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=775de716add17322f24b476439f903a829446eb6"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8311",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c2.2.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to execute arbitrary code."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "44514",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/44514/"
            },
            {
              "name": "98634",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98634"
            },
            {
              "name": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=775de716add17322f24b476439f903a829446eb6",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=775de716add17322f24b476439f903a829446eb6"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8311",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:22.584Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8313 (GCVE-0-2017-8313)

Vulnerability from cvelistv5 – Published: 2017-05-23 21:00 – Updated: 2024-08-05 16:34
VLAI?
Summary
Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file.
Severity ?
No CVSS data available.
CWE
  • Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service).
Assigner
References
https://security.gentoo.org/glsa/201707-10 vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/98633 vdb-entryx_refsource_BID
http://www.debian.org/security/2017/dsa-3899 vendor-advisoryx_refsource_DEBIAN
http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=co… x_refsource_CONFIRM
Impacted products
Vendor Product Version
VideoLAN VLC Affected: < 2.2.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:22.885Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "98633",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98633"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=commitdiff%3Bh=05b653355ce303ada3b5e0e645ae717fea39186c"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.2.5"
            }
          ]
        }
      ],
      "datePublic": "2017-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service).",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "98633",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98633"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=commitdiff%3Bh=05b653355ce303ada3b5e0e645ae717fea39186c"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8313",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c 2.2.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "98633",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98633"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            },
            {
              "name": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=commitdiff;h=05b653355ce303ada3b5e0e645ae717fea39186c",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=commitdiff;h=05b653355ce303ada3b5e0e645ae717fea39186c"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8313",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:22.885Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8312 (GCVE-0-2017-8312)

Vulnerability from cvelistv5 – Published: 2017-05-23 21:00 – Updated: 2024-08-05 16:34
VLAI?
Summary
Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file.
Severity ?
No CVSS data available.
CWE
  • Allows attacker to read heap uninitialized data (potentially beyond allocated data - depends on heap implementation).
Assigner
References
https://security.gentoo.org/glsa/201707-10 vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/98631 vdb-entryx_refsource_BID
http://www.debian.org/security/2017/dsa-3899 vendor-advisoryx_refsource_DEBIAN
http://git.videolan.org/?p=vlc.git%3Ba=blobdiff%3… x_refsource_CONFIRM
Impacted products
Vendor Product Version
VideoLAN VLC Affected: All
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:22.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "98631",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98631"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc.git%3Ba=blobdiff%3Bf=modules/demux/subtitle.c%3Bh=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3%3Bhp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974%3Bhb=611398fc8d32f3fe4331f60b220c52ba3557beaa%3Bhpb=075bc7169b05b004fa0250e4a4ce5516b05487a9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "All"
            }
          ]
        }
      ],
      "datePublic": "2017-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to read heap uninitialized data (potentially beyond allocated data - depends on heap implementation).",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "98631",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98631"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc.git%3Ba=blobdiff%3Bf=modules/demux/subtitle.c%3Bh=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3%3Bhp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974%3Bhb=611398fc8d32f3fe4331f60b220c52ba3557beaa%3Bhpb=075bc7169b05b004fa0250e4a4ce5516b05487a9"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8312",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to read heap uninitialized data (potentially beyond allocated data - depends on heap implementation)."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "98631",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98631"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            },
            {
              "name": "http://git.videolan.org/?p=vlc.git;a=blobdiff;f=modules/demux/subtitle.c;h=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3;hp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974;hb=611398fc8d32f3fe4331f60b220c52ba3557beaa;hpb=075bc7169b05b004fa0250e4a4ce5516b05487a9",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc.git;a=blobdiff;f=modules/demux/subtitle.c;h=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3;hp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974;hb=611398fc8d32f3fe4331f60b220c52ba3557beaa;hpb=075bc7169b05b004fa0250e4a4ce5516b05487a9"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8312",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:22.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-6440 (GCVE-0-2014-6440)

Vulnerability from cvelistv5 – Published: 2017-03-28 15:00 – Updated: 2024-08-06 12:17
VLAI?
Summary
VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:17:23.884Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
          },
          {
            "name": "72950",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/72950"
          },
          {
            "name": "GLSA-201603-08",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201603-08"
          },
          {
            "name": "[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2015/q1/751"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-03-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-28T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
        },
        {
          "name": "72950",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/72950"
        },
        {
          "name": "GLSA-201603-08",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201603-08"
        },
        {
          "name": "[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2015/q1/751"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-6440",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.videolan.org/developers/vlc-branch/NEWS",
              "refsource": "MISC",
              "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
            },
            {
              "name": "72950",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/72950"
            },
            {
              "name": "GLSA-201603-08",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201603-08"
            },
            {
              "name": "[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2015/q1/751"
            },
            {
              "name": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/",
              "refsource": "MISC",
              "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-6440",
    "datePublished": "2017-03-28T15:00:00",
    "dateReserved": "2014-09-16T00:00:00",
    "dateUpdated": "2024-08-06T12:17:23.884Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2147 (GCVE-0-2008-2147)

Vulnerability from cvelistv5 – Published: 2008-05-12 20:00 – Updated: 2024-08-07 08:49
VLAI?
Summary
Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:49:58.575Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "31317",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31317"
          },
          {
            "name": "vlc-searchpath-code-execution(42377)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.videolan.org/vlc/ticket/1578"
          },
          {
            "name": "GLSA-200807-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "31317",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31317"
        },
        {
          "name": "vlc-searchpath-code-execution(42377)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.videolan.org/vlc/ticket/1578"
        },
        {
          "name": "GLSA-200807-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2147",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "31317",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31317"
            },
            {
              "name": "vlc-searchpath-code-execution(42377)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
            },
            {
              "name": "http://git.videolan.org/?p=vlc.git;a=commit;h=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc.git;a=commit;h=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
            },
            {
              "name": "http://trac.videolan.org/vlc/ticket/1578",
              "refsource": "CONFIRM",
              "url": "http://trac.videolan.org/vlc/ticket/1578"
            },
            {
              "name": "GLSA-200807-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2147",
    "datePublished": "2008-05-12T20:00:00",
    "dateReserved": "2008-05-12T00:00:00",
    "dateUpdated": "2024-08-07T08:49:58.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1768 (GCVE-0-2008-1768)

Vulnerability from cvelistv5 – Published: 2008-04-24 18:00 – Updated: 2024-08-07 08:32
VLAI?
Summary
Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.videolan.org/security/sa0803.php x_refsource_CONFIRM
http://www.securityfocus.com/bid/28903 vdb-entryx_refsource_BID
http://www.videolan.org/developers/vlc/NEWS x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200804-25.xml vendor-advisoryx_refsource_GENTOO
http://wiki.videolan.org/Changelog/0.8.6f x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://secunia.com/advisories/29800 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/29503 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0985 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:32:01.266Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0803.php"
          },
          {
            "name": "28903",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28903"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/developers/vlc/NEWS"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "oval:org.mitre.oval:def:14412",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "29503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29503"
          },
          {
            "name": "ADV-2008-0985",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0985"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0803.php"
        },
        {
          "name": "28903",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28903"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/developers/vlc/NEWS"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "oval:org.mitre.oval:def:14412",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "29503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29503"
        },
        {
          "name": "ADV-2008-0985",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0985"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1768",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.videolan.org/security/sa0803.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0803.php"
            },
            {
              "name": "28903",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28903"
            },
            {
              "name": "http://www.videolan.org/developers/vlc/NEWS",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/developers/vlc/NEWS"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "oval:org.mitre.oval:def:14412",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "29503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29503"
            },
            {
              "name": "ADV-2008-0985",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0985"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1768",
    "datePublished": "2008-04-24T18:00:00",
    "dateReserved": "2008-04-12T00:00:00",
    "dateUpdated": "2024-08-07T08:32:01.266Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1769 (GCVE-0-2008-1769)

Vulnerability from cvelistv5 – Published: 2008-04-24 18:00 – Updated: 2024-08-07 08:32
VLAI?
Summary
VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:32:01.282Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0803.php"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/developers/vlc/NEWS"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "28904",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28904"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "oval:org.mitre.oval:def:14445",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
          },
          {
            "name": "29503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29503"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
          },
          {
            "name": "ADV-2008-0985",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0985"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0803.php"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/developers/vlc/NEWS"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "28904",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28904"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "oval:org.mitre.oval:def:14445",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
        },
        {
          "name": "29503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29503"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
        },
        {
          "name": "ADV-2008-0985",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0985"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1769",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.videolan.org/security/sa0803.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0803.php"
            },
            {
              "name": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=cf489d7bff3c1b36b2d5501ecf21129c78104d98",
              "refsource": "MISC",
              "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
            },
            {
              "name": "http://www.videolan.org/developers/vlc/NEWS",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/developers/vlc/NEWS"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "28904",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28904"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "oval:org.mitre.oval:def:14445",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
            },
            {
              "name": "29503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29503"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3",
              "refsource": "MISC",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
            },
            {
              "name": "ADV-2008-0985",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0985"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1769",
    "datePublished": "2008-04-24T18:00:00",
    "dateReserved": "2008-04-12T00:00:00",
    "dateUpdated": "2024-08-07T08:32:01.282Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1881 (GCVE-0-2008-1881)

Vulnerability from cvelistv5 – Published: 2008-04-17 23:00 – Updated: 2024-08-07 08:40
VLAI?
Summary
Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file. NOTE: this issue is due to an incomplete fix for CVE-2007-6681.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://aluigi.org/adv/vlcboffs-adv.txt x_refsource_MISC
http://www.securityfocus.com/archive/1/489698 mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/28233 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200804-25.xml vendor-advisoryx_refsource_GENTOO
http://wiki.videolan.org/Changelog/0.8.6f x_refsource_CONFIRM
http://www.securityfocus.com/bid/28274 vdb-entryx_refsource_BID
http://secunia.com/advisories/29800 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
https://www.exploit-db.com/exploits/5250 exploitx_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://aluigi.altervista.org/adv/vlcboffs-adv.txt x_refsource_MISC
http://www.securityfocus.com/bid/28251 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:40:59.548Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "vlc-parsessa-bo(41936)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
          },
          {
            "name": "20080317 VLC highlander bug",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489698"
          },
          {
            "name": "28233",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28233"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "28274",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28274"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "oval:org.mitre.oval:def:14872",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
          },
          {
            "name": "5250",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5250"
          },
          {
            "name": "vlcmediaplayer-subtitle-bo(41237)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
          },
          {
            "name": "28251",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28251"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file.  NOTE: this issue is due to an incomplete fix for CVE-2007-6681."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "vlc-parsessa-bo(41936)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
        },
        {
          "name": "20080317 VLC highlander bug",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489698"
        },
        {
          "name": "28233",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28233"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "28274",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28274"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "oval:org.mitre.oval:def:14872",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
        },
        {
          "name": "5250",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5250"
        },
        {
          "name": "vlcmediaplayer-subtitle-bo(41237)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
        },
        {
          "name": "28251",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28251"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1881",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file.  NOTE: this issue is due to an incomplete fix for CVE-2007-6681."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "vlc-parsessa-bo(41936)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
            },
            {
              "name": "http://aluigi.org/adv/vlcboffs-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
            },
            {
              "name": "20080317 VLC highlander bug",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489698"
            },
            {
              "name": "28233",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28233"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "28274",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28274"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "oval:org.mitre.oval:def:14872",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
            },
            {
              "name": "5250",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5250"
            },
            {
              "name": "vlcmediaplayer-subtitle-bo(41237)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
            },
            {
              "name": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
            },
            {
              "name": "28251",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28251"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1881",
    "datePublished": "2008-04-17T23:00:00",
    "dateReserved": "2008-04-17T00:00:00",
    "dateUpdated": "2024-08-07T08:40:59.548Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1489 (GCVE-0-2008-1489)

Vulnerability from cvelistv5 – Published: 2008-03-25 00:00 – Updated: 2024-08-07 08:24
VLAI?
Summary
Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2008/dsa-1543 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/bid/28433 vdb-entryx_refsource_BID
http://trac.videolan.org/vlc/changeset/09572892df… x_refsource_CONFIRM
http://www.videolan.org/security/sa0803.php x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200804-25.xml vendor-advisoryx_refsource_GENTOO
http://wiki.videolan.org/Changelog/0.8.6f x_refsource_CONFIRM
http://secunia.com/advisories/29800 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://secunia.com/advisories/29766 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/29503 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0985 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:24:42.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1543",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1543"
          },
          {
            "name": "28433",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28433"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0803.php"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "oval:org.mitre.oval:def:14841",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
          },
          {
            "name": "29766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29766"
          },
          {
            "name": "29503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29503"
          },
          {
            "name": "ADV-2008-0985",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0985"
          },
          {
            "name": "vlcmediaplayer-mp4readbox-rdrf-bo(41412)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1543",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1543"
        },
        {
          "name": "28433",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28433"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0803.php"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "oval:org.mitre.oval:def:14841",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
        },
        {
          "name": "29766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29766"
        },
        {
          "name": "29503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29503"
        },
        {
          "name": "ADV-2008-0985",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0985"
        },
        {
          "name": "vlcmediaplayer-mp4readbox-rdrf-bo(41412)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1489",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1543",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1543"
            },
            {
              "name": "28433",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28433"
            },
            {
              "name": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a",
              "refsource": "CONFIRM",
              "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
            },
            {
              "name": "http://www.videolan.org/security/sa0803.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0803.php"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "oval:org.mitre.oval:def:14841",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
            },
            {
              "name": "29766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29766"
            },
            {
              "name": "29503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29503"
            },
            {
              "name": "ADV-2008-0985",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0985"
            },
            {
              "name": "vlcmediaplayer-mp4readbox-rdrf-bo(41412)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1489",
    "datePublished": "2008-03-25T00:00:00",
    "dateReserved": "2008-03-24T00:00:00",
    "dateUpdated": "2024-08-07T08:24:42.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8310 (GCVE-0-2017-8310)

Vulnerability from nvd – Published: 2017-05-23 21:00 – Updated: 2024-08-05 16:34
VLAI?
Summary
Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file.
Severity ?
No CVSS data available.
CWE
  • Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)
Assigner
References
https://security.gentoo.org/glsa/201707-10 vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/98638 vdb-entryx_refsource_BID
http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=bl… x_refsource_CONFIRM
http://www.debian.org/security/2017/dsa-3899 vendor-advisoryx_refsource_DEBIAN
Impacted products
Vendor Product Version
VideoLAN VLC Affected: 2.2.*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:21.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "98638",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98638"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=blobdiff%3Bf=modules/codec/subsdec.c%3Bh=addd8c71f30d53558fffd19059b374be45cf0f8e%3Bhp=1b4276e299a2a6668047231d29ac705ae93076ba%3Bhb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328%3Bhpb=3477dba3d506de8d95bccef2c6b67861188f6c29"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "2.2.*"
            }
          ]
        }
      ],
      "datePublic": "2017-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "98638",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98638"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=blobdiff%3Bf=modules/codec/subsdec.c%3Bh=addd8c71f30d53558fffd19059b374be45cf0f8e%3Bhp=1b4276e299a2a6668047231d29ac705ae93076ba%3Bhb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328%3Bhpb=3477dba3d506de8d95bccef2c6b67861188f6c29"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8310",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.2.*"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "98638",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98638"
            },
            {
              "name": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=blobdiff;f=modules/codec/subsdec.c;h=addd8c71f30d53558fffd19059b374be45cf0f8e;hp=1b4276e299a2a6668047231d29ac705ae93076ba;hb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328;hpb=3477dba3d506de8d95bccef2c6b67861188f6c29",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=blobdiff;f=modules/codec/subsdec.c;h=addd8c71f30d53558fffd19059b374be45cf0f8e;hp=1b4276e299a2a6668047231d29ac705ae93076ba;hb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328;hpb=3477dba3d506de8d95bccef2c6b67861188f6c29"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8310",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:21.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8311 (GCVE-0-2017-8311)

Vulnerability from nvd – Published: 2017-05-23 21:00 – Updated: 2024-08-05 16:34
VLAI?
Summary
Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file.
Severity ?
No CVSS data available.
CWE
  • Allows attacker to execute arbitrary code.
Assigner
References
https://security.gentoo.org/glsa/201707-10 vendor-advisoryx_refsource_GENTOO
https://www.exploit-db.com/exploits/44514/ exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/98634 vdb-entryx_refsource_BID
http://git.videolan.org/?p=vlc.git%3Ba=commitdiff… x_refsource_CONFIRM
http://www.debian.org/security/2017/dsa-3899 vendor-advisoryx_refsource_DEBIAN
Impacted products
Vendor Product Version
VideoLAN VLC Affected: <2.2.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:22.584Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "44514",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/44514/"
          },
          {
            "name": "98634",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98634"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=775de716add17322f24b476439f903a829446eb6"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c2.2.5"
            }
          ]
        }
      ],
      "datePublic": "2017-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to execute arbitrary code.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-26T09:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "44514",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/44514/"
        },
        {
          "name": "98634",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98634"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=775de716add17322f24b476439f903a829446eb6"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8311",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c2.2.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to execute arbitrary code."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "44514",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/44514/"
            },
            {
              "name": "98634",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98634"
            },
            {
              "name": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=775de716add17322f24b476439f903a829446eb6",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=775de716add17322f24b476439f903a829446eb6"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8311",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:22.584Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8313 (GCVE-0-2017-8313)

Vulnerability from nvd – Published: 2017-05-23 21:00 – Updated: 2024-08-05 16:34
VLAI?
Summary
Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file.
Severity ?
No CVSS data available.
CWE
  • Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service).
Assigner
References
https://security.gentoo.org/glsa/201707-10 vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/98633 vdb-entryx_refsource_BID
http://www.debian.org/security/2017/dsa-3899 vendor-advisoryx_refsource_DEBIAN
http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=co… x_refsource_CONFIRM
Impacted products
Vendor Product Version
VideoLAN VLC Affected: < 2.2.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:22.885Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "98633",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98633"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=commitdiff%3Bh=05b653355ce303ada3b5e0e645ae717fea39186c"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.2.5"
            }
          ]
        }
      ],
      "datePublic": "2017-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service).",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "98633",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98633"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=commitdiff%3Bh=05b653355ce303ada3b5e0e645ae717fea39186c"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8313",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c 2.2.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "98633",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98633"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            },
            {
              "name": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=commitdiff;h=05b653355ce303ada3b5e0e645ae717fea39186c",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=commitdiff;h=05b653355ce303ada3b5e0e645ae717fea39186c"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8313",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:22.885Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8312 (GCVE-0-2017-8312)

Vulnerability from nvd – Published: 2017-05-23 21:00 – Updated: 2024-08-05 16:34
VLAI?
Summary
Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file.
Severity ?
No CVSS data available.
CWE
  • Allows attacker to read heap uninitialized data (potentially beyond allocated data - depends on heap implementation).
Assigner
References
https://security.gentoo.org/glsa/201707-10 vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/98631 vdb-entryx_refsource_BID
http://www.debian.org/security/2017/dsa-3899 vendor-advisoryx_refsource_DEBIAN
http://git.videolan.org/?p=vlc.git%3Ba=blobdiff%3… x_refsource_CONFIRM
Impacted products
Vendor Product Version
VideoLAN VLC Affected: All
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:22.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "98631",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98631"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc.git%3Ba=blobdiff%3Bf=modules/demux/subtitle.c%3Bh=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3%3Bhp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974%3Bhb=611398fc8d32f3fe4331f60b220c52ba3557beaa%3Bhpb=075bc7169b05b004fa0250e4a4ce5516b05487a9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "All"
            }
          ]
        }
      ],
      "datePublic": "2017-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to read heap uninitialized data (potentially beyond allocated data - depends on heap implementation).",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "98631",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98631"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc.git%3Ba=blobdiff%3Bf=modules/demux/subtitle.c%3Bh=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3%3Bhp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974%3Bhb=611398fc8d32f3fe4331f60b220c52ba3557beaa%3Bhpb=075bc7169b05b004fa0250e4a4ce5516b05487a9"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8312",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to read heap uninitialized data (potentially beyond allocated data - depends on heap implementation)."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "98631",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98631"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            },
            {
              "name": "http://git.videolan.org/?p=vlc.git;a=blobdiff;f=modules/demux/subtitle.c;h=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3;hp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974;hb=611398fc8d32f3fe4331f60b220c52ba3557beaa;hpb=075bc7169b05b004fa0250e4a4ce5516b05487a9",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc.git;a=blobdiff;f=modules/demux/subtitle.c;h=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3;hp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974;hb=611398fc8d32f3fe4331f60b220c52ba3557beaa;hpb=075bc7169b05b004fa0250e4a4ce5516b05487a9"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8312",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:22.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-6440 (GCVE-0-2014-6440)

Vulnerability from nvd – Published: 2017-03-28 15:00 – Updated: 2024-08-06 12:17
VLAI?
Summary
VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:17:23.884Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
          },
          {
            "name": "72950",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/72950"
          },
          {
            "name": "GLSA-201603-08",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201603-08"
          },
          {
            "name": "[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2015/q1/751"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-03-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-28T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
        },
        {
          "name": "72950",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/72950"
        },
        {
          "name": "GLSA-201603-08",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201603-08"
        },
        {
          "name": "[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2015/q1/751"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-6440",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.videolan.org/developers/vlc-branch/NEWS",
              "refsource": "MISC",
              "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
            },
            {
              "name": "72950",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/72950"
            },
            {
              "name": "GLSA-201603-08",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201603-08"
            },
            {
              "name": "[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2015/q1/751"
            },
            {
              "name": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/",
              "refsource": "MISC",
              "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-6440",
    "datePublished": "2017-03-28T15:00:00",
    "dateReserved": "2014-09-16T00:00:00",
    "dateUpdated": "2024-08-06T12:17:23.884Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2147 (GCVE-0-2008-2147)

Vulnerability from nvd – Published: 2008-05-12 20:00 – Updated: 2024-08-07 08:49
VLAI?
Summary
Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:49:58.575Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "31317",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31317"
          },
          {
            "name": "vlc-searchpath-code-execution(42377)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.videolan.org/vlc/ticket/1578"
          },
          {
            "name": "GLSA-200807-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "31317",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31317"
        },
        {
          "name": "vlc-searchpath-code-execution(42377)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.videolan.org/vlc/ticket/1578"
        },
        {
          "name": "GLSA-200807-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2147",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "31317",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31317"
            },
            {
              "name": "vlc-searchpath-code-execution(42377)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
            },
            {
              "name": "http://git.videolan.org/?p=vlc.git;a=commit;h=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc.git;a=commit;h=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
            },
            {
              "name": "http://trac.videolan.org/vlc/ticket/1578",
              "refsource": "CONFIRM",
              "url": "http://trac.videolan.org/vlc/ticket/1578"
            },
            {
              "name": "GLSA-200807-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2147",
    "datePublished": "2008-05-12T20:00:00",
    "dateReserved": "2008-05-12T00:00:00",
    "dateUpdated": "2024-08-07T08:49:58.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1768 (GCVE-0-2008-1768)

Vulnerability from nvd – Published: 2008-04-24 18:00 – Updated: 2024-08-07 08:32
VLAI?
Summary
Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.videolan.org/security/sa0803.php x_refsource_CONFIRM
http://www.securityfocus.com/bid/28903 vdb-entryx_refsource_BID
http://www.videolan.org/developers/vlc/NEWS x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200804-25.xml vendor-advisoryx_refsource_GENTOO
http://wiki.videolan.org/Changelog/0.8.6f x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://secunia.com/advisories/29800 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/29503 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0985 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:32:01.266Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0803.php"
          },
          {
            "name": "28903",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28903"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/developers/vlc/NEWS"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "oval:org.mitre.oval:def:14412",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "29503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29503"
          },
          {
            "name": "ADV-2008-0985",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0985"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0803.php"
        },
        {
          "name": "28903",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28903"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/developers/vlc/NEWS"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "oval:org.mitre.oval:def:14412",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "29503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29503"
        },
        {
          "name": "ADV-2008-0985",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0985"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1768",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.videolan.org/security/sa0803.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0803.php"
            },
            {
              "name": "28903",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28903"
            },
            {
              "name": "http://www.videolan.org/developers/vlc/NEWS",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/developers/vlc/NEWS"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "oval:org.mitre.oval:def:14412",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "29503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29503"
            },
            {
              "name": "ADV-2008-0985",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0985"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1768",
    "datePublished": "2008-04-24T18:00:00",
    "dateReserved": "2008-04-12T00:00:00",
    "dateUpdated": "2024-08-07T08:32:01.266Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1769 (GCVE-0-2008-1769)

Vulnerability from nvd – Published: 2008-04-24 18:00 – Updated: 2024-08-07 08:32
VLAI?
Summary
VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:32:01.282Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0803.php"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/developers/vlc/NEWS"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "28904",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28904"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "oval:org.mitre.oval:def:14445",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
          },
          {
            "name": "29503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29503"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
          },
          {
            "name": "ADV-2008-0985",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0985"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0803.php"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/developers/vlc/NEWS"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "28904",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28904"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "oval:org.mitre.oval:def:14445",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
        },
        {
          "name": "29503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29503"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
        },
        {
          "name": "ADV-2008-0985",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0985"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1769",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.videolan.org/security/sa0803.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0803.php"
            },
            {
              "name": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=cf489d7bff3c1b36b2d5501ecf21129c78104d98",
              "refsource": "MISC",
              "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
            },
            {
              "name": "http://www.videolan.org/developers/vlc/NEWS",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/developers/vlc/NEWS"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "28904",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28904"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "oval:org.mitre.oval:def:14445",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
            },
            {
              "name": "29503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29503"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3",
              "refsource": "MISC",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
            },
            {
              "name": "ADV-2008-0985",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0985"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1769",
    "datePublished": "2008-04-24T18:00:00",
    "dateReserved": "2008-04-12T00:00:00",
    "dateUpdated": "2024-08-07T08:32:01.282Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1881 (GCVE-0-2008-1881)

Vulnerability from nvd – Published: 2008-04-17 23:00 – Updated: 2024-08-07 08:40
VLAI?
Summary
Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file. NOTE: this issue is due to an incomplete fix for CVE-2007-6681.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://aluigi.org/adv/vlcboffs-adv.txt x_refsource_MISC
http://www.securityfocus.com/archive/1/489698 mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/28233 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200804-25.xml vendor-advisoryx_refsource_GENTOO
http://wiki.videolan.org/Changelog/0.8.6f x_refsource_CONFIRM
http://www.securityfocus.com/bid/28274 vdb-entryx_refsource_BID
http://secunia.com/advisories/29800 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
https://www.exploit-db.com/exploits/5250 exploitx_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://aluigi.altervista.org/adv/vlcboffs-adv.txt x_refsource_MISC
http://www.securityfocus.com/bid/28251 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:40:59.548Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "vlc-parsessa-bo(41936)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
          },
          {
            "name": "20080317 VLC highlander bug",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489698"
          },
          {
            "name": "28233",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28233"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "28274",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28274"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "oval:org.mitre.oval:def:14872",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
          },
          {
            "name": "5250",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5250"
          },
          {
            "name": "vlcmediaplayer-subtitle-bo(41237)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
          },
          {
            "name": "28251",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28251"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file.  NOTE: this issue is due to an incomplete fix for CVE-2007-6681."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "vlc-parsessa-bo(41936)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
        },
        {
          "name": "20080317 VLC highlander bug",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489698"
        },
        {
          "name": "28233",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28233"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "28274",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28274"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "oval:org.mitre.oval:def:14872",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
        },
        {
          "name": "5250",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5250"
        },
        {
          "name": "vlcmediaplayer-subtitle-bo(41237)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
        },
        {
          "name": "28251",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28251"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1881",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file.  NOTE: this issue is due to an incomplete fix for CVE-2007-6681."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "vlc-parsessa-bo(41936)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
            },
            {
              "name": "http://aluigi.org/adv/vlcboffs-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
            },
            {
              "name": "20080317 VLC highlander bug",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489698"
            },
            {
              "name": "28233",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28233"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "28274",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28274"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "oval:org.mitre.oval:def:14872",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
            },
            {
              "name": "5250",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5250"
            },
            {
              "name": "vlcmediaplayer-subtitle-bo(41237)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
            },
            {
              "name": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
            },
            {
              "name": "28251",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28251"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1881",
    "datePublished": "2008-04-17T23:00:00",
    "dateReserved": "2008-04-17T00:00:00",
    "dateUpdated": "2024-08-07T08:40:59.548Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1489 (GCVE-0-2008-1489)

Vulnerability from nvd – Published: 2008-03-25 00:00 – Updated: 2024-08-07 08:24
VLAI?
Summary
Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2008/dsa-1543 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/bid/28433 vdb-entryx_refsource_BID
http://trac.videolan.org/vlc/changeset/09572892df… x_refsource_CONFIRM
http://www.videolan.org/security/sa0803.php x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200804-25.xml vendor-advisoryx_refsource_GENTOO
http://wiki.videolan.org/Changelog/0.8.6f x_refsource_CONFIRM
http://secunia.com/advisories/29800 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://secunia.com/advisories/29766 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/29503 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0985 vdb-entryx_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:24:42.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1543",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1543"
          },
          {
            "name": "28433",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28433"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0803.php"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "oval:org.mitre.oval:def:14841",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
          },
          {
            "name": "29766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29766"
          },
          {
            "name": "29503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29503"
          },
          {
            "name": "ADV-2008-0985",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0985"
          },
          {
            "name": "vlcmediaplayer-mp4readbox-rdrf-bo(41412)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1543",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1543"
        },
        {
          "name": "28433",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28433"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0803.php"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "oval:org.mitre.oval:def:14841",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
        },
        {
          "name": "29766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29766"
        },
        {
          "name": "29503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29503"
        },
        {
          "name": "ADV-2008-0985",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0985"
        },
        {
          "name": "vlcmediaplayer-mp4readbox-rdrf-bo(41412)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1489",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1543",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1543"
            },
            {
              "name": "28433",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28433"
            },
            {
              "name": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a",
              "refsource": "CONFIRM",
              "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
            },
            {
              "name": "http://www.videolan.org/security/sa0803.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0803.php"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "oval:org.mitre.oval:def:14841",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
            },
            {
              "name": "29766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29766"
            },
            {
              "name": "29503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29503"
            },
            {
              "name": "ADV-2008-0985",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0985"
            },
            {
              "name": "vlcmediaplayer-mp4readbox-rdrf-bo(41412)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1489",
    "datePublished": "2008-03-25T00:00:00",
    "dateReserved": "2008-03-24T00:00:00",
    "dateUpdated": "2024-08-07T08:24:42.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

FKIE_CVE-2014-6440

Vulnerability from fkie_nvd - Published: 2017-03-28 15:59 - Updated: 2025-04-20 01:37
Severity ?
Summary
VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service.
Impacted products
Vendor Product Version
videolan vlc *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F659207F-B405-40C2-8508-E32CBD916E0D",
              "versionEndIncluding": "2.1.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service."
    },
    {
      "lang": "es",
      "value": "VideoLAN VLC media player en versiones anteriores a 2.1.5 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2014-6440",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-28T15:59:00.160",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://seclists.org/oss-sec/2015/q1/751"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/72950"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://security.gentoo.org/glsa/201603-08"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://seclists.org/oss-sec/2015/q1/751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/72950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://security.gentoo.org/glsa/201603-08"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-2147

Vulnerability from fkie_nvd - Published: 2008-05-12 20:20 - Updated: 2025-04-09 00:30
Severity ?
Summary
Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory.
Impacted products
Vendor Product Version
videolan vlc *
videolan vlc 0.4.6
videolan vlc 0.5.0
videolan vlc 0.5.1
videolan vlc 0.5.1a
videolan vlc 0.5.2
videolan vlc 0.5.3
videolan vlc 0.6.0
videolan vlc 0.6.1
videolan vlc 0.6.2
videolan vlc 0.7.0
videolan vlc 0.7.1
videolan vlc 0.7.2
videolan vlc 0.8.0
videolan vlc 0.8.1
videolan vlc 0.8.2
videolan vlc 0.8.4
videolan vlc 0.8.4a
videolan vlc 0.8.5
videolan vlc 0.8.6a
videolan vlc 0.8.6b
videolan vlc 0.8.6c
videolan vlc 0.8.6d
videolan vlc 0.8.6e

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5ACEC7-D436-49F2-821B-EE4B1D982A55",
              "versionEndIncluding": "0.8.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBF1B20-1478-472C-B9A1-974A7A5333C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C29EDDF9-DE90-4AA7-8454-D42B4C37ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AF1C9A-FD6F-4CA4-8275-8B7655F861F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "26768501-C17C-4ABF-AB47-D4BE2C902D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B56B15F-7504-4D55-8C31-1C28F1A8129D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BB497-20F6-4CCB-A24E-7228BE68CA5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2855B3-D0ED-4C8E-95A0-151E88F95057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B90DCE-2EA9-49AA-9F63-0515C751E821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C4F8C4-EEA4-4369-BBC8-C726059C8852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2821324-7A44-40CD-95B8-F4B5B09E6D69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A98AC34-2FAB-4CAE-9D14-B4E11CC2AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "347E213C-83AF-4F98-8096-2113E00C1BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A26753D-44F2-49F6-8486-1DD61297C037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C2B1C1-1606-411D-A9CA-D1A654FD4133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BBBBAF-71F7-4F47-ADE6-FF7B590832E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC67A7B-21E0-45DA-A70F-EE97079140A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1062EB82-2A6C-4770-A339-21686FF9E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA7ECBE-1CAE-47C5-ACC1-F7BBA3946CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E85F765-D2DF-41C0-A90F-732861CA32F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "26981B0C-6A7E-40BA-8F50-0C19870258FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6c:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAFEE4-35FE-44BE-90DD-1E067A1A2AAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de b\u00fasqueda en ruta no confiable en VideoLAN VLC anterior a 0.9.0 permite a usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una librer\u00eda bajo los subdirectorios modules/ o plugins/ del directorio actual."
    }
  ],
  "id": "CVE-2008-2147",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-05-12T20:20:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31317"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.videolan.org/vlc/ticket/1578"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.videolan.org/vlc/ticket/1578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1768

Vulnerability from fkie_nvd - Published: 2008-04-25 06:05 - Updated: 2025-04-09 00:30
Severity ?
Summary
Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow.
Impacted products
Vendor Product Version
videolan vlc 0.1.99
videolan vlc 0.1.99a
videolan vlc 0.1.99b
videolan vlc 0.1.99c
videolan vlc 0.1.99d
videolan vlc 0.1.99e
videolan vlc 0.1.99f
videolan vlc 0.1.99g
videolan vlc 0.1.99h
videolan vlc 0.1.99i
videolan vlc 0.2.0
videolan vlc 0.2.50
videolan vlc 0.2.60
videolan vlc 0.2.61
videolan vlc 0.2.62
videolan vlc 0.2.63
videolan vlc 0.2.70
videolan vlc 0.2.71
videolan vlc 0.2.72
videolan vlc 0.2.73
videolan vlc 0.2.80
videolan vlc 0.2.81
videolan vlc 0.2.82
videolan vlc 0.2.83
videolan vlc 0.2.90
videolan vlc 0.2.91
videolan vlc 0.2.92
videolan vlc 0.3.0
videolan vlc 0.3.1
videolan vlc 0.4.0
videolan vlc 0.4.1
videolan vlc 0.4.2
videolan vlc 0.4.3
videolan vlc 0.4.3_ac3
videolan vlc 0.4.4
videolan vlc 0.4.5
videolan vlc 0.4.6
videolan vlc 0.5.0
videolan vlc 0.5.1
videolan vlc 0.5.2
videolan vlc 0.5.3
videolan vlc 0.6.0
videolan vlc 0.6.1
videolan vlc 0.6.2
videolan vlc 0.7.0
videolan vlc 0.7.1
videolan vlc 0.7.2
videolan vlc 0.8.0
videolan vlc 0.8.1
videolan vlc 0.8.2
videolan vlc 0.8.4
videolan vlc 0.8.4a
videolan vlc 0.8.5
videolan vlc 0.8.6
videolan vlc 0.8.6a
videolan vlc 0.8.6b
videolan vlc 0.8.6c
videolan vlc 0.8.6d
videolan vlc 0.8.6e
videolan vlc 0.8.1337

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "929E49D1-B8F6-4A25-A93F-D8211520ED61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B61BB1FD-6D2A-42EA-9824-9A8FD728B4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99b:*:*:*:*:*:*:*",
              "matchCriteriaId": "76DDF802-26C2-437E-BB01-F01209FFE0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99c:*:*:*:*:*:*:*",
              "matchCriteriaId": "546BAE28-5B2A-4856-8B2A-316D9AD2F5A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99d:*:*:*:*:*:*:*",
              "matchCriteriaId": "56926B35-987F-4C12-9FBC-61BF7CEE1541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8FAE03-C528-4BAD-823E-EEEC4368113D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99f:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5B604B-5A7A-450A-8252-60FDCB114283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99g:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FCD5D6-A4A9-48CD-BD0E-296FD1032907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99h:*:*:*:*:*:*:*",
              "matchCriteriaId": "5624A925-C0D8-4E85-9B32-085BB9059FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99i:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E35B1D-3191-4E18-B265-ACA736A87645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60FCBA5D-568F-424B-BFB1-1BA41DB0D6B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "656BBC4D-8569-4A91-87DF-93D053BEEC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9C7B19-59F4-43FB-8122-AAD36ABDF807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DB4C0-CCEE-40D6-B227-E00A002D755B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE9872-10B5-466E-BEE4-69B6451076C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6125D6E-6416-49E8-8770-5C0590F3FA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "27122F7C-1D19-41D8-B323-A6941D0DE193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "6068DB81-542B-43F0-9B42-CEA7689F61D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "A009555D-CC59-4C6A-B350-E7F4730F5B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "3299D365-015F-4A95-80C3-977853E70E1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "47EC751E-FB47-4263-B9ED-FBBAAEA677F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA7C125-989A-4727-9E59-44ACC1750E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC105DEB-DE1F-4183-8A4A-F7E58FBB82C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "521F12A2-7785-48C9-BB11-E91CEF61584F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A412BA-A195-4893-B5F8-EE6FC9A53326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6ADA95A-A8B2-4E3E-A3E4-AEA03B14C339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7823310-E6C2-42D6-A0CC-8D2A0CA5EB6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBE2DF23-1CF5-4371-82EF-7072B0FCC226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F706E26-E58D-4B5C-98AC-A386BF7ABC24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19F3E58-0D65-45AF-8024-E3A7CFD05142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B24956D-A924-40BC-A340-3BE9DD3CCBA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F94AC83A-6790-4E26-A4B8-E2B4394CB3FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD6F543A-8520-4F13-9C03-9520A6B92944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.3_ac3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3991F10-CFC4-4979-B5D4-F9EFB9992683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FC4A5C-5A0A-40CF-891B-97443CC4A367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6656C05D-4A4B-47DE-9844-308FD98CFF04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBF1B20-1478-472C-B9A1-974A7A5333C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C29EDDF9-DE90-4AA7-8454-D42B4C37ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AF1C9A-FD6F-4CA4-8275-8B7655F861F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B56B15F-7504-4D55-8C31-1C28F1A8129D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BB497-20F6-4CCB-A24E-7228BE68CA5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2855B3-D0ED-4C8E-95A0-151E88F95057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B90DCE-2EA9-49AA-9F63-0515C751E821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C4F8C4-EEA4-4369-BBC8-C726059C8852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2821324-7A44-40CD-95B8-F4B5B09E6D69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A98AC34-2FAB-4CAE-9D14-B4E11CC2AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "347E213C-83AF-4F98-8096-2113E00C1BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A26753D-44F2-49F6-8486-1DD61297C037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C2B1C1-1606-411D-A9CA-D1A654FD4133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BBBBAF-71F7-4F47-ADE6-FF7B590832E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC67A7B-21E0-45DA-A70F-EE97079140A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1062EB82-2A6C-4770-A339-21686FF9E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA7ECBE-1CAE-47C5-ACC1-F7BBA3946CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A23534-3DF7-422A-B997-1FB16D8564C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E85F765-D2DF-41C0-A90F-732861CA32F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "26981B0C-6A7E-40BA-8F50-0C19870258FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6c:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAFEE4-35FE-44BE-90DD-1E067A1A2AAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1337:*:*:*:*:*:*:*",
              "matchCriteriaId": "053BE4FF-4699-42E8-B480-DA2224EC2BDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de enteros en VLC anterior a 0.8.6f, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s del demultiplexador (1) MP4, (2) Real y (3) el codec Cinepak, que inicia el desbordamiento de b\u00fafer."
    }
  ],
  "id": "CVE-2008-1768",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-04-25T06:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28903"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/developers/vlc/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/developers/vlc/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1769

Vulnerability from fkie_nvd - Published: 2008-04-25 06:05 - Updated: 2025-04-09 00:30
Severity ?
Summary
VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption.
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=214627#c3
cve@mitre.orghttp://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98
cve@mitre.orghttp://secunia.com/advisories/29503
cve@mitre.orghttp://secunia.com/advisories/29800
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-25.xml
cve@mitre.orghttp://wiki.videolan.org/Changelog/0.8.6f
cve@mitre.orghttp://www.securityfocus.com/bid/28904
cve@mitre.orghttp://www.videolan.org/developers/vlc/NEWS
cve@mitre.orghttp://www.videolan.org/security/sa0803.php
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0985
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=214627#c3
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29503
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29800
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-25.xml
af854a3a-2127-422b-91ae-364da2661108http://wiki.videolan.org/Changelog/0.8.6f
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28904
af854a3a-2127-422b-91ae-364da2661108http://www.videolan.org/developers/vlc/NEWS
af854a3a-2127-422b-91ae-364da2661108http://www.videolan.org/security/sa0803.php
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0985
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445
Impacted products
Vendor Product Version
videolan vlc 0.1.99
videolan vlc 0.1.99a
videolan vlc 0.1.99b
videolan vlc 0.1.99c
videolan vlc 0.1.99d
videolan vlc 0.1.99e
videolan vlc 0.1.99f
videolan vlc 0.1.99g
videolan vlc 0.1.99h
videolan vlc 0.1.99i
videolan vlc 0.2.0
videolan vlc 0.2.50
videolan vlc 0.2.60
videolan vlc 0.2.61
videolan vlc 0.2.62
videolan vlc 0.2.63
videolan vlc 0.2.70
videolan vlc 0.2.71
videolan vlc 0.2.72
videolan vlc 0.2.73
videolan vlc 0.2.80
videolan vlc 0.2.81
videolan vlc 0.2.82
videolan vlc 0.2.83
videolan vlc 0.2.90
videolan vlc 0.2.91
videolan vlc 0.2.92
videolan vlc 0.3.0
videolan vlc 0.3.1
videolan vlc 0.4.0
videolan vlc 0.4.1
videolan vlc 0.4.2
videolan vlc 0.4.3
videolan vlc 0.4.3_ac3
videolan vlc 0.4.4
videolan vlc 0.4.5
videolan vlc 0.4.6
videolan vlc 0.5.0
videolan vlc 0.5.1
videolan vlc 0.5.2
videolan vlc 0.5.3
videolan vlc 0.6.0
videolan vlc 0.6.1
videolan vlc 0.6.2
videolan vlc 0.7.0
videolan vlc 0.7.1
videolan vlc 0.7.2
videolan vlc 0.8.0
videolan vlc 0.8.1
videolan vlc 0.8.2
videolan vlc 0.8.4
videolan vlc 0.8.4a
videolan vlc 0.8.5
videolan vlc 0.8.6
videolan vlc 0.8.6a
videolan vlc 0.8.6b
videolan vlc 0.8.6c
videolan vlc 0.8.6d
videolan vlc 0.8.6e
videolan vlc 0.8.1337

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "929E49D1-B8F6-4A25-A93F-D8211520ED61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B61BB1FD-6D2A-42EA-9824-9A8FD728B4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99b:*:*:*:*:*:*:*",
              "matchCriteriaId": "76DDF802-26C2-437E-BB01-F01209FFE0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99c:*:*:*:*:*:*:*",
              "matchCriteriaId": "546BAE28-5B2A-4856-8B2A-316D9AD2F5A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99d:*:*:*:*:*:*:*",
              "matchCriteriaId": "56926B35-987F-4C12-9FBC-61BF7CEE1541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8FAE03-C528-4BAD-823E-EEEC4368113D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99f:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5B604B-5A7A-450A-8252-60FDCB114283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99g:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FCD5D6-A4A9-48CD-BD0E-296FD1032907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99h:*:*:*:*:*:*:*",
              "matchCriteriaId": "5624A925-C0D8-4E85-9B32-085BB9059FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99i:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E35B1D-3191-4E18-B265-ACA736A87645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60FCBA5D-568F-424B-BFB1-1BA41DB0D6B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "656BBC4D-8569-4A91-87DF-93D053BEEC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9C7B19-59F4-43FB-8122-AAD36ABDF807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DB4C0-CCEE-40D6-B227-E00A002D755B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE9872-10B5-466E-BEE4-69B6451076C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6125D6E-6416-49E8-8770-5C0590F3FA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "27122F7C-1D19-41D8-B323-A6941D0DE193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "6068DB81-542B-43F0-9B42-CEA7689F61D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "A009555D-CC59-4C6A-B350-E7F4730F5B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "3299D365-015F-4A95-80C3-977853E70E1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "47EC751E-FB47-4263-B9ED-FBBAAEA677F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA7C125-989A-4727-9E59-44ACC1750E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC105DEB-DE1F-4183-8A4A-F7E58FBB82C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "521F12A2-7785-48C9-BB11-E91CEF61584F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A412BA-A195-4893-B5F8-EE6FC9A53326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6ADA95A-A8B2-4E3E-A3E4-AEA03B14C339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7823310-E6C2-42D6-A0CC-8D2A0CA5EB6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBE2DF23-1CF5-4371-82EF-7072B0FCC226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F706E26-E58D-4B5C-98AC-A386BF7ABC24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19F3E58-0D65-45AF-8024-E3A7CFD05142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B24956D-A924-40BC-A340-3BE9DD3CCBA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F94AC83A-6790-4E26-A4B8-E2B4394CB3FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD6F543A-8520-4F13-9C03-9520A6B92944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.3_ac3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3991F10-CFC4-4979-B5D4-F9EFB9992683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FC4A5C-5A0A-40CF-891B-97443CC4A367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6656C05D-4A4B-47DE-9844-308FD98CFF04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBF1B20-1478-472C-B9A1-974A7A5333C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C29EDDF9-DE90-4AA7-8454-D42B4C37ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AF1C9A-FD6F-4CA4-8275-8B7655F861F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B56B15F-7504-4D55-8C31-1C28F1A8129D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BB497-20F6-4CCB-A24E-7228BE68CA5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2855B3-D0ED-4C8E-95A0-151E88F95057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B90DCE-2EA9-49AA-9F63-0515C751E821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C4F8C4-EEA4-4369-BBC8-C726059C8852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2821324-7A44-40CD-95B8-F4B5B09E6D69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A98AC34-2FAB-4CAE-9D14-B4E11CC2AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "347E213C-83AF-4F98-8096-2113E00C1BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A26753D-44F2-49F6-8486-1DD61297C037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C2B1C1-1606-411D-A9CA-D1A654FD4133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BBBBAF-71F7-4F47-ADE6-FF7B590832E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC67A7B-21E0-45DA-A70F-EE97079140A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1062EB82-2A6C-4770-A339-21686FF9E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA7ECBE-1CAE-47C5-ACC1-F7BBA3946CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A23534-3DF7-422A-B997-1FB16D8564C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E85F765-D2DF-41C0-A90F-732861CA32F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "26981B0C-6A7E-40BA-8F50-0C19870258FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6c:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAFEE4-35FE-44BE-90DD-1E067A1A2AAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1337:*:*:*:*:*:*:*",
              "matchCriteriaId": "053BE4FF-4699-42E8-B480-DA2224EC2BDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption."
    },
    {
      "lang": "es",
      "value": "VLC versions anteriores a la 0.8.6f, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un Cinepak manipulado que dispara un acceso a array fuera de l\u00edmite y una corrupci\u00f3n de memoria."
    }
  ],
  "id": "CVE-2008-1769",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-04-25T06:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28904"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/developers/vlc/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28904"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/developers/vlc/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1881

Vulnerability from fkie_nvd - Published: 2008-04-17 23:05 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file. NOTE: this issue is due to an incomplete fix for CVE-2007-6681.
References
cve@mitre.orghttp://aluigi.altervista.org/adv/vlcboffs-adv.txt
cve@mitre.orghttp://aluigi.org/adv/vlcboffs-adv.txt
cve@mitre.orghttp://secunia.com/advisories/28233
cve@mitre.orghttp://secunia.com/advisories/29800
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-25.xml
cve@mitre.orghttp://wiki.videolan.org/Changelog/0.8.6f
cve@mitre.orghttp://www.securityfocus.com/archive/1/489698
cve@mitre.orghttp://www.securityfocus.com/bid/28251
cve@mitre.orghttp://www.securityfocus.com/bid/28274
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41237
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41936
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872
cve@mitre.orghttps://www.exploit-db.com/exploits/5250
af854a3a-2127-422b-91ae-364da2661108http://aluigi.altervista.org/adv/vlcboffs-adv.txt
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/adv/vlcboffs-adv.txt
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28233
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29800
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-25.xml
af854a3a-2127-422b-91ae-364da2661108http://wiki.videolan.org/Changelog/0.8.6f
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/489698
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28251
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28274
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41237
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41936
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5250
Impacted products
Vendor Product Version
videolan vlc 0.8.6e

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file.  NOTE: this issue is due to an incomplete fix for CVE-2007-6681."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ParseSSA (modules/demux/subtitle.c) en VLC 0.8.6e permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un subtitulo largeo en un archivo SSA. NOTA: este problema es debido a una correcci\u00f3n incompleta para CVE-2007-6681."
    }
  ],
  "id": "CVE-2008-1881",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-04-17T23:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489698"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28251"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28274"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489698"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28274"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5250"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-1489

Vulnerability from fkie_nvd - Published: 2008-03-25 00:44 - Updated: 2025-04-09 00:30
Severity ?
Summary
Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984.
References
cve@mitre.orghttp://secunia.com/advisories/29503
cve@mitre.orghttp://secunia.com/advisories/29766
cve@mitre.orghttp://secunia.com/advisories/29800
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-25.xml
cve@mitre.orghttp://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0aExploit
cve@mitre.orghttp://wiki.videolan.org/Changelog/0.8.6f
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1543
cve@mitre.orghttp://www.securityfocus.com/bid/28433
cve@mitre.orghttp://www.videolan.org/security/sa0803.php
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0985
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41412
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29503
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29766
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29800
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-25.xml
af854a3a-2127-422b-91ae-364da2661108http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0aExploit
af854a3a-2127-422b-91ae-364da2661108http://wiki.videolan.org/Changelog/0.8.6f
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1543
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28433
af854a3a-2127-422b-91ae-364da2661108http://www.videolan.org/security/sa0803.php
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0985
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41412
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841
Impacted products
Vendor Product Version
videolan vlc 0.8.6e

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n MP4_ReadBox_rdrf de libmp4.c para VLC 0.8.6e permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una MP4 RDRF box manipulada que dispara un desbordamiento de b\u00fafer basado en mont\u00edculo, una vulnerabilidad distinta a CVE-2008-0984."
    }
  ],
  "id": "CVE-2008-1489",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-25T00:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28433"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-6681

Vulnerability from fkie_nvd - Published: 2008-01-17 01:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via a long subtitle in a (1) MicroDvd, (2) SSA, and (3) Vplayer file.
References
cve@mitre.orghttp://aluigi.altervista.org/adv/vlcboffs-adv.txt
cve@mitre.orghttp://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html
cve@mitre.orghttp://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html
cve@mitre.orghttp://osvdb.org/42207
cve@mitre.orghttp://secunia.com/advisories/28233
cve@mitre.orghttp://secunia.com/advisories/29284
cve@mitre.orghttp://secunia.com/advisories/29766
cve@mitre.orghttp://secunia.com/advisories/29800
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-25.xml
cve@mitre.orghttp://securityreason.com/securityalert/3550
cve@mitre.orghttp://wiki.videolan.org/Changelog/0.8.6f
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1543
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
cve@mitre.orghttp://www.securityfocus.com/archive/1/485488/30/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/27015
cve@mitre.orghttp://www.videolan.org/security/sa0801.php
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334
cve@mitre.orghttps://www.exploit-db.com/exploits/5667
af854a3a-2127-422b-91ae-364da2661108http://aluigi.altervista.org/adv/vlcboffs-adv.txt
af854a3a-2127-422b-91ae-364da2661108http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html
af854a3a-2127-422b-91ae-364da2661108http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42207
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28233
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29766
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29800
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-25.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3550
af854a3a-2127-422b-91ae-364da2661108http://wiki.videolan.org/Changelog/0.8.6f
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1543
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/485488/30/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27015
af854a3a-2127-422b-91ae-364da2661108http://www.videolan.org/security/sa0801.php
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5667
Impacted products
Vendor Product Version
videolan vlc *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E219A8-7A7C-49A5-9978-A1470CEF3702",
              "versionEndIncluding": "0.8.6d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via a long subtitle in a (1) MicroDvd, (2) SSA, and (3) Vplayer file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en modules/demux/subtitle.c de VideoLAN VLC 0.8.6d permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un subt\u00edtulo largo en un fichero (1) MicroDvd, (2) SSA, y (3) Vplayer."
    }
  ],
  "id": "CVE-2007-6681",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-17T01:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42207"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3550"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27015"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/security/sa0801.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42207"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/security/sa0801.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5667"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-6683

Vulnerability from fkie_nvd - Published: 2008-01-17 01:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability.
References
cve@mitre.orghttp://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.htmlExploit
cve@mitre.orghttp://osvdb.org/42205
cve@mitre.orghttp://osvdb.org/42206
cve@mitre.orghttp://secunia.com/advisories/29284
cve@mitre.orghttp://secunia.com/advisories/29766
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1543
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
cve@mitre.orghttp://www.securityfocus.com/bid/28712
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619
cve@mitre.orghttps://trac.videolan.org/vlc/changeset/23197
cve@mitre.orghttps://trac.videolan.org/vlc/ticket/1371
af854a3a-2127-422b-91ae-364da2661108http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42205
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42206
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29766
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1543
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28712
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619
af854a3a-2127-422b-91ae-364da2661108https://trac.videolan.org/vlc/changeset/23197
af854a3a-2127-422b-91ae-364da2661108https://trac.videolan.org/vlc/ticket/1371
Impacted products
Vendor Product Version
videolan vlc 0.8.6d

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability."
    },
    {
      "lang": "es",
      "value": "La extensi\u00f3n de navegaci\u00f3n de VideoLAN VLC 0.8.6d permite a atacantes remotos sobrescribir ficheros de su elecci\u00f3n mediante (1) la opci\u00f3n :demuxdump-file en un nombre de fichero de una lista de reproducci\u00f3n, o (2) una sentencia EXTVLCOPT en un fichero MP3, posiblemente una vulnerabilidad de inyecci\u00f3n de argumento."
    }
  ],
  "id": "CVE-2007-6683",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-17T01:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42205"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42206"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28712"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://trac.videolan.org/vlc/changeset/23197"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://trac.videolan.org/vlc/ticket/1371"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42206"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://trac.videolan.org/vlc/changeset/23197"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://trac.videolan.org/vlc/ticket/1371"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-6682

Vulnerability from fkie_nvd - Published: 2008-01-17 01:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.
References
cve@mitre.orghttp://aluigi.altervista.org/adv/vlcboffs-adv.txt
cve@mitre.orghttp://osvdb.org/42208
cve@mitre.orghttp://secunia.com/advisories/28233
cve@mitre.orghttp://secunia.com/advisories/29284
cve@mitre.orghttp://secunia.com/advisories/29766
cve@mitre.orghttp://securityreason.com/securityalert/3550
cve@mitre.orghttp://trac.videolan.org/vlc/changeset/23839
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1543
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
cve@mitre.orghttp://www.securityfocus.com/archive/1/485488/30/0/threadedExploit
cve@mitre.orghttp://www.securityfocus.com/bid/27015
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790
cve@mitre.orghttps://www.exploit-db.com/exploits/5519
af854a3a-2127-422b-91ae-364da2661108http://aluigi.altervista.org/adv/vlcboffs-adv.txt
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42208
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28233
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29766
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3550
af854a3a-2127-422b-91ae-364da2661108http://trac.videolan.org/vlc/changeset/23839
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1543
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/485488/30/0/threadedExploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27015
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5519
Impacted products
Vendor Product Version
videolan vlc *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E219A8-7A7C-49A5-9978-A1470CEF3702",
              "versionEndIncluding": "0.8.6d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de cadena de formato en la funci\u00f3n httpd_FileCallBack (network/httpd.c) de VideoLAN VLC 0.8.6d permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante especificadores de cadenas de formato en el par\u00e1metro Connection."
    }
  ],
  "id": "CVE-2007-6682",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-17T01:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42208"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3550"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.videolan.org/vlc/changeset/23839"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27015"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42208"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.videolan.org/vlc/changeset/23839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5519"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-6684

Vulnerability from fkie_nvd - Published: 2008-01-17 01:00 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RTSP module in VideoLAN VLC 0.8.6d allows remote attackers to cause a denial of service (crash) via a request without a Transport parameter, which triggers a NULL pointer dereference."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo RTSP de VideoLAN VLC 0.8.6d permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante una petici\u00f3n sin el par\u00e1metro Transfer, lo cual provoca una referencia a un puntero nulo."
    }
  ],
  "id": "CVE-2007-6684",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-17T01:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-September/034722.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.videolan.org/vlc/changeset/22023"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-September/034722.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.videolan.org/vlc/changeset/22023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14876"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}