RULE(RULE ID:333039)

Rule General Information
Release Date: 2021-03-26
Rule Name: VideoLAN VLC Media Player SMB Module Win32AddConnection Buffer Overflow Vulnerability (CVE-2009-2484)
Severity:
CVE ID:
Rule Protection Details
Description: A buffer overflow vulnerability has been reported in VideoLAN VLC Media Player. The vulnerability is due to a boundary error in function "Win32AddConnection()" in file "modules/access/smb.c" while parsing specially crafted SMB path. Remote attackers can exploit this vulnerability, for example, by enticing target users to open a playlist file having an overly long "smb://" URI that will cause an stack buffer overflow, or by sending a specially crafted request to VLC web interface. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the logged in user. In an attack case where code injection is not successful, the affected application will terminate abnormally.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows, Linux, Others
Reference: ExploitDB:9029
http://git.videolan.org/?p=vlc.git
a=commit
h=e60a9038b13b5eb805a76755efc5c6d5e080180f
Solutions
Refer to the announcement or patch by the vendor: http://www.videolan.org/