Lucene search

K
saintSAINT CorporationSAINT:D505716659D7BAD66BE2DC93D44734CC
HistoryMay 09, 2012 - 12:00 a.m.

VideoLAN VLC Media Player MMS URI Stack Overflow

2012-05-0900:00:00
SAINT Corporation
my.saintcorporation.com
35

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.965

Percentile

99.6%

Added: 05/09/2012
CVE: CVE-2012-1775
BID: 53391
OSVDB: 80188

Background

VLC media player is a media player supporting various audio and video formats for multiple platforms.

Problem

VLC Player versions 2.0.0 and lower do not properly validate the hostname when accessing MMS URIs. An overly long hostname may trigger a stack overflow. If a user were to view a malicious web page that contained a specially crafted MMS URI, it could allow an attacker to gain execution privileges on the user’s system.

Resolution

Upgrade to VLC 2.0.1 or later.

References

<http://www.videolan.org/security/sa1201.html&gt;

Limitations

This exploit has been tested against VideoLAN VLC Media Player 2.0.0 on Windows XP SP3 English (DEP OptIn), using Internet Explorer 7.

Platforms

Windows

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.965

Percentile

99.6%