gsd-2013-3245
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
** DISPUTED ** plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception. NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating "This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine." A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2013-3245",
    "description": "** DISPUTED ** plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception.  NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating \"This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine.\" A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow.",
    "id": "GSD-2013-3245"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2013-3245"
      ],
      "details": "** DISPUTED ** plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception.  NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating \"This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine.\" A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow.",
      "id": "GSD-2013-3245",
      "modified": "2023-12-13T01:22:23.060712Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
        "ID": "CVE-2013-3245",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "** DISPUTED ** plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception.  NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating \"This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine.\" A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia",
            "refsource": "MISC",
            "url": "http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia"
          },
          {
            "name": "61032",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/61032"
          },
          {
            "name": "20130710 VLC media player MKV Parsing POC",
            "refsource": "FULLDISC",
            "url": "http://seclists.org/fulldisclosure/2013/Jul/71"
          },
          {
            "name": "52956",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/52956"
          },
          {
            "name": "20130710 Re: VLC media player MKV Parsing POC",
            "refsource": "FULLDISC",
            "url": "http://seclists.org/fulldisclosure/2013/Jul/77"
          },
          {
            "name": "20130710 Re: VLC media player MKV Parsing POC",
            "refsource": "FULLDISC",
            "url": "http://seclists.org/fulldisclosure/2013/Jul/79"
          },
          {
            "name": "http://secunia.com/blog/372/",
            "refsource": "MISC",
            "url": "http://secunia.com/blog/372/"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:videolan:vlc_media_player:2.0.7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0716C113-BD32-4459-BA81-10E89128FE91",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception.  NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating \"This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine.\" A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow"
          },
          {
            "lang": "es",
            "value": "**EN DISPUTA** plugins/demux/libmkv_plugin.dll en VideoLAN VLC Media Player v2.0.7, y posiblemente otras versiones, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo MKV especialmente dise\u00f1ado, posiblemente provocando un desbordamiento de entero y fuera de los l\u00edmites de lectura o desbordamiento de b\u00fafer basado en memoria din\u00e1mica, o una excepci\u00f3n no capturada. NOTA: el vendedor se afirm\u00f3 que, \"este PoC bloquea VLC, en efecto, pero no hace nada m\u00e1s ... esto no es un error de desbordamiento de entero, sino una excepci\u00f3n no capturada y dudo que sea explotable. Esta excepci\u00f3n no capturada hace que VLC se interrumpa, pero no ejecuta c\u00f3digo arbitrario, en mi m\u00e1quina Linux 64bits \". Un prueba de concepto publicado por el investigador original muestra signos de una lectura fuera de los l\u00edmites controlada, aunque la instrucci\u00f3n afectada no implica un registro que influya directamente en el flujo de control."
          }
        ],
        "id": "CVE-2013-3245",
        "lastModified": "2024-04-11T00:50:15.173",
        "metrics": {
          "cvssMetricV2": [
            {
              "acInsufInfo": false,
              "baseSeverity": "MEDIUM",
              "cvssData": {
                "accessComplexity": "MEDIUM",
                "accessVector": "NETWORK",
                "authentication": "NONE",
                "availabilityImpact": "PARTIAL",
                "baseScore": 6.8,
                "confidentialityImpact": "PARTIAL",
                "integrityImpact": "PARTIAL",
                "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                "version": "2.0"
              },
              "exploitabilityScore": 8.6,
              "impactScore": 6.4,
              "obtainAllPrivilege": false,
              "obtainOtherPrivilege": false,
              "obtainUserPrivilege": false,
              "source": "nvd@nist.gov",
              "type": "Primary",
              "userInteractionRequired": false
            }
          ]
        },
        "published": "2013-07-10T19:55:04.797",
        "references": [
          {
            "source": "PSIRT-CNA@flexerasoftware.com",
            "tags": [
              "Exploit"
            ],
            "url": "http://seclists.org/fulldisclosure/2013/Jul/71"
          },
          {
            "source": "PSIRT-CNA@flexerasoftware.com",
            "url": "http://seclists.org/fulldisclosure/2013/Jul/77"
          },
          {
            "source": "PSIRT-CNA@flexerasoftware.com",
            "url": "http://seclists.org/fulldisclosure/2013/Jul/79"
          },
          {
            "source": "PSIRT-CNA@flexerasoftware.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "http://secunia.com/advisories/52956"
          },
          {
            "source": "PSIRT-CNA@flexerasoftware.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "http://secunia.com/blog/372/"
          },
          {
            "source": "PSIRT-CNA@flexerasoftware.com",
            "url": "http://www.jbkempf.com/blog/post/2013/More-lies-from-Secunia"
          },
          {
            "source": "PSIRT-CNA@flexerasoftware.com",
            "url": "http://www.securityfocus.com/bid/61032"
          }
        ],
        "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-119"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.