Lucene search

K
nessusThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.VLC_2_0_6.NASL
HistoryApr 25, 2013 - 12:00 a.m.

VLC < 2.0.6 ASF Demuxer Buffer Overflow

2013-04-2500:00:00
This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.04

Percentile

92.1%

The version of VLC media player installed on the remote host is earlier than 2.0.6. It is, therefore, reportedly affected by a buffer overflow vulnerability related to the ASF demuxer plugin.

#
# (C) Tenable Network Security, Inc.
#




include("compat.inc");

if (description)
{
  script_id(66216);
  script_version("1.3");
  script_cvs_date("Date: 2019/11/27");

  script_cve_id("CVE-2013-1954");
  script_bugtraq_id(57333);

  script_name(english:"VLC < 2.0.6 ASF Demuxer Buffer Overflow");
  script_summary(english:"Checks version of VLC");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a media player that is affected by a
buffer overflow vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of VLC media player installed on the remote host is earlier
than 2.0.6.  It is, therefore, reportedly affected by a buffer overflow
vulnerability related to the ASF demuxer plugin.");
  script_set_attribute(attribute:"see_also", value:"http://www.videolan.org/security/sa1302.html");
  # http://git.videolan.org/?p=vlc.git;a=commit;h=b31ce523331aa3a6e620b68cdfe3f161d519631e
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b8052708");
  script_set_attribute(attribute:"see_also", value:"http://trac.videolan.org/vlc/ticket/8024");
  script_set_attribute(attribute:"see_also", value:"http://www.videolan.org/vlc/releases/2.0.6.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to VLC version 2.0.6 or later.  Alternatively, remove the
affected plugin file from VLC's plugins directory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-1954");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/01/11");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/01/17");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/04/25");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:videolan:vlc_media_player");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("vlc_installed.nasl");
  script_require_keys("SMB/VLC/Version");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

vuln_plugins_installed = make_list();
version = get_kb_item_or_exit("SMB/VLC/Version");

path = get_kb_item_or_exit("SMB/VLC/File");
path = ereg_replace(pattern:"^(.+)\\[^\\]+$", replace:"\1", string:path);

# nb: 'version' may look like '0.9.8a'!
if (
  version =~ "^[01]\." ||
  version =~ "^2\.0\.[0-5]($|[^0-9])"
) version_is_vulnerable = TRUE;
else audit(AUDIT_INST_PATH_NOT_VULN, "VLC", version, path);

installed_plugins = get_kb_list("SMB/VLC/plugin*");
if (isnull(installed_plugins)) audit(AUDIT_KB_MISSING, "SMB/VLC/plugin");

foreach plugin (installed_plugins)
  if ("\libasf_plugin.dll" >< plugin)
    vuln_plugins_installed = make_list(vuln_plugins_installed, plugin);

if (
  # Paranoid scan
  report_paranoia > 1
  ||
  # plugin file check
  max_index(vuln_plugins_installed) > 0
)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  if (report_verbosity > 0)
  {
    report =
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 2.0.6\n';

    # Add plugin paths if available
    if (max_index(vuln_plugins_installed) > 0)
    {
      report +=
      '\n  - Vulnerable Plugin(s) ';

      if (max_index(vuln_plugins_installed) > 1)
        report += 'Paths : ';
      else
        report += 'Path  : ';

      foreach plugin_path (vuln_plugins_installed)
        report += '\n    ' + plugin_path;

      report += '\n';
    }
    security_warning(port:port, extra:report);
  }
  else security_warning(port);
  exit(0);
}
else exit(0, "The VLC "+version+" install under "+path+" does not have the affected plugin.");

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.04

Percentile

92.1%