RULE(RULE ID:321776)

Rule General Information
Release Date: 2019-05-28
Rule Name: VideoLAN VLC Media Player TY Processing Buffer Overflow Vulnerability (CVE-2008-4654)
Severity:
CVE ID:
Rule Protection Details
Description: Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player 0.9.0 through 0.9.4 allows remote attackers to execute arbitrary code via a TiVo TY media file with a header containing a crafted size value.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityFocusBID:31813
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
http://git.videolan.org/?p=vlc.git
a=commit
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://git.videolan.org/?p=vlc.git;a=commitdiff;h=26d92b87bba99b5ea2e17b7eaa39c462d65e9133