Security Advisory 1302
Summary : Buffer Overflow in
Date : January 2013
Affected versions : VLC media player
2.0.5 and earlier
ID : VideoLAN-SA-1302
CVE reference : CVE-2013-1954
Details When parsing a specially crafted buffer overflow might occur. Impact If successful, a malicious third party could trigger an invalid memory access, leading to a crash of VLC media player's process. In some cases attackers might exploit this
issue to execute arbitrary code within the context of the application but this information is not confirmed. Threat mitigation Exploitation of this issue requires the user to explicitly open a specially crafted ASF movie. Workarounds The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.
Alternatively, the ASF demuxer (libasf_plugin.*) can be removed manually from the VLC plugin installation directory. This will prevent ASF movie playback. Solution This issue is addressed in VLC media player 2.0.x source code repository by replacing a macro with a static inline and improved bounds checking.
This patch is included in VLC's 2.0.6 release. Windows and Mac OS X builds can be found on the VideoLAN nightlies website. Credits This vulnerability was reported by Debasish Mandal. References
The VideoLAN
VLC official GIT repository http://git.videolan.org/?p=vlc.git History
11 Apr 2013 VLC media player 2.0.6 release.17 Jan 2013 Nightly builds version of VLC 2.0.6 released for testing purposes. 17 Jan 2013 Patch for VLC media player committed to the source code repository, and to the stable branch. 11 Jan 2013 Crash reported to the VLC project.
Summary : Buffer Overflow in
Date : January 2013
Affected versions : VLC media player
2.0.5 and earlier
ID : VideoLAN-SA-1302
CVE reference : CVE-2013-1954
Details When parsing a specially crafted buffer overflow might occur. Impact If successful, a malicious third party could trigger an invalid memory access, leading to a crash of VLC media player's process. In some cases attackers might exploit this
issue to execute arbitrary code within the context of the application but this information is not confirmed. Threat mitigation Exploitation of this issue requires the user to explicitly open a specially crafted ASF movie. Workarounds The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.
Alternatively, the ASF demuxer (libasf_plugin.*) can be removed manually from the VLC plugin installation directory. This will prevent ASF movie playback. Solution This issue is addressed in VLC media player 2.0.x source code repository by replacing a macro with a static inline and improved bounds checking.
This patch is included in VLC's 2.0.6 release. Windows and Mac OS X builds can be found on the VideoLAN nightlies website. Credits This vulnerability was reported by Debasish Mandal. References
The VideoLAN
VLC official GIT repository http://git.videolan.org/?p=vlc.git History
11 Apr 2013 VLC media player 2.0.6 release.17 Jan 2013 Nightly builds version of VLC 2.0.6 released for testing purposes. 17 Jan 2013 Patch for VLC media player committed to the source code repository, and to the stable branch. 11 Jan 2013 Crash reported to the VLC project.
Post a Comment