|
|||
Rule General Information |
---|
Release Date: | 2019-05-28 | |
Rule Name: | VideoLAN VLC Media Player TY Processing Buffer Overflow Vulnerability (CVE-2008-4654) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player 0.9.0 through 0.9.4 allows remote attackers to execute arbitrary code via a TiVo TY media file with a header containing a crafted size value. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:31813 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726 http://git.videolan.org/?p=vlc.git a=commit |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://git.videolan.org/?p=vlc.git;a=commitdiff;h=26d92b87bba99b5ea2e17b7eaa39c462d65e9133 |