CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
97.0%
Integer overflow in the ReadRealIndex function in real.c in the Real demuxer plugin in VideoLAN VLC media player 0.9.0 through 0.9.7 allows remote attackers to execute arbitrary code via a malformed RealMedia (.rm) file that triggers a heap-based buffer overflow.
Vendor | Product | Version | CPE |
---|---|---|---|
videolan | vlc_media_player | 0.9.0 | cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:* |
videolan | vlc_media_player | 0.9.1 | cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:* |
videolan | vlc_media_player | 0.9.2 | cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:* |
videolan | vlc_media_player | 0.9.3 | cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:* |
videolan | vlc_media_player | 0.9.4 | cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:* |
videolan | vlc_media_player | 0.9.5 | cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:* |
videolan | vlc_media_player | 0.9.6 | cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:* |
videolan | vlc_media_player | 0.9.7 | cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:* |
videolan | vlc_media_player | 0.9.8 | cpe:2.3:a:videolan:vlc_media_player:0.9.8:*:*:*:*:*:*:* |
git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d19de4e9f2211cbe5bde00726b66c47a424f4e07
secunia.com/advisories/32942
secunia.com/advisories/33315
security.gentoo.org/glsa/glsa-200812-24.xml
securityreason.com/securityalert/4680
www.osvdb.org/50333
www.securityfocus.com/archive/1/498768/100/0/threaded
www.securityfocus.com/bid/32545
www.trapkit.de/advisories/TKADV2008-013.txt
www.videolan.org/security/sa0811.html
www.vupen.com/english/advisories/2008/3287
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14793