Vulnerabilites related to VideoLAN - VLC
Vulnerability from fkie_nvd
Published
2008-04-25 06:05
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow.
Impacted products
Vendor Product Version
videolan vlc 0.1.99
videolan vlc 0.1.99a
videolan vlc 0.1.99b
videolan vlc 0.1.99c
videolan vlc 0.1.99d
videolan vlc 0.1.99e
videolan vlc 0.1.99f
videolan vlc 0.1.99g
videolan vlc 0.1.99h
videolan vlc 0.1.99i
videolan vlc 0.2.0
videolan vlc 0.2.50
videolan vlc 0.2.60
videolan vlc 0.2.61
videolan vlc 0.2.62
videolan vlc 0.2.63
videolan vlc 0.2.70
videolan vlc 0.2.71
videolan vlc 0.2.72
videolan vlc 0.2.73
videolan vlc 0.2.80
videolan vlc 0.2.81
videolan vlc 0.2.82
videolan vlc 0.2.83
videolan vlc 0.2.90
videolan vlc 0.2.91
videolan vlc 0.2.92
videolan vlc 0.3.0
videolan vlc 0.3.1
videolan vlc 0.4.0
videolan vlc 0.4.1
videolan vlc 0.4.2
videolan vlc 0.4.3
videolan vlc 0.4.3_ac3
videolan vlc 0.4.4
videolan vlc 0.4.5
videolan vlc 0.4.6
videolan vlc 0.5.0
videolan vlc 0.5.1
videolan vlc 0.5.2
videolan vlc 0.5.3
videolan vlc 0.6.0
videolan vlc 0.6.1
videolan vlc 0.6.2
videolan vlc 0.7.0
videolan vlc 0.7.1
videolan vlc 0.7.2
videolan vlc 0.8.0
videolan vlc 0.8.1
videolan vlc 0.8.2
videolan vlc 0.8.4
videolan vlc 0.8.4a
videolan vlc 0.8.5
videolan vlc 0.8.6
videolan vlc 0.8.6a
videolan vlc 0.8.6b
videolan vlc 0.8.6c
videolan vlc 0.8.6d
videolan vlc 0.8.6e
videolan vlc 0.8.1337



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "929E49D1-B8F6-4A25-A93F-D8211520ED61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B61BB1FD-6D2A-42EA-9824-9A8FD728B4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99b:*:*:*:*:*:*:*",
              "matchCriteriaId": "76DDF802-26C2-437E-BB01-F01209FFE0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99c:*:*:*:*:*:*:*",
              "matchCriteriaId": "546BAE28-5B2A-4856-8B2A-316D9AD2F5A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99d:*:*:*:*:*:*:*",
              "matchCriteriaId": "56926B35-987F-4C12-9FBC-61BF7CEE1541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8FAE03-C528-4BAD-823E-EEEC4368113D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99f:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5B604B-5A7A-450A-8252-60FDCB114283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99g:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FCD5D6-A4A9-48CD-BD0E-296FD1032907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99h:*:*:*:*:*:*:*",
              "matchCriteriaId": "5624A925-C0D8-4E85-9B32-085BB9059FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99i:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E35B1D-3191-4E18-B265-ACA736A87645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60FCBA5D-568F-424B-BFB1-1BA41DB0D6B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "656BBC4D-8569-4A91-87DF-93D053BEEC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9C7B19-59F4-43FB-8122-AAD36ABDF807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DB4C0-CCEE-40D6-B227-E00A002D755B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE9872-10B5-466E-BEE4-69B6451076C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6125D6E-6416-49E8-8770-5C0590F3FA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "27122F7C-1D19-41D8-B323-A6941D0DE193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "6068DB81-542B-43F0-9B42-CEA7689F61D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "A009555D-CC59-4C6A-B350-E7F4730F5B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "3299D365-015F-4A95-80C3-977853E70E1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "47EC751E-FB47-4263-B9ED-FBBAAEA677F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA7C125-989A-4727-9E59-44ACC1750E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC105DEB-DE1F-4183-8A4A-F7E58FBB82C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "521F12A2-7785-48C9-BB11-E91CEF61584F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A412BA-A195-4893-B5F8-EE6FC9A53326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6ADA95A-A8B2-4E3E-A3E4-AEA03B14C339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7823310-E6C2-42D6-A0CC-8D2A0CA5EB6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBE2DF23-1CF5-4371-82EF-7072B0FCC226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F706E26-E58D-4B5C-98AC-A386BF7ABC24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19F3E58-0D65-45AF-8024-E3A7CFD05142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B24956D-A924-40BC-A340-3BE9DD3CCBA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F94AC83A-6790-4E26-A4B8-E2B4394CB3FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD6F543A-8520-4F13-9C03-9520A6B92944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.3_ac3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3991F10-CFC4-4979-B5D4-F9EFB9992683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FC4A5C-5A0A-40CF-891B-97443CC4A367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6656C05D-4A4B-47DE-9844-308FD98CFF04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBF1B20-1478-472C-B9A1-974A7A5333C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C29EDDF9-DE90-4AA7-8454-D42B4C37ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AF1C9A-FD6F-4CA4-8275-8B7655F861F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B56B15F-7504-4D55-8C31-1C28F1A8129D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BB497-20F6-4CCB-A24E-7228BE68CA5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2855B3-D0ED-4C8E-95A0-151E88F95057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B90DCE-2EA9-49AA-9F63-0515C751E821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C4F8C4-EEA4-4369-BBC8-C726059C8852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2821324-7A44-40CD-95B8-F4B5B09E6D69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A98AC34-2FAB-4CAE-9D14-B4E11CC2AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "347E213C-83AF-4F98-8096-2113E00C1BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A26753D-44F2-49F6-8486-1DD61297C037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C2B1C1-1606-411D-A9CA-D1A654FD4133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BBBBAF-71F7-4F47-ADE6-FF7B590832E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC67A7B-21E0-45DA-A70F-EE97079140A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1062EB82-2A6C-4770-A339-21686FF9E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA7ECBE-1CAE-47C5-ACC1-F7BBA3946CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A23534-3DF7-422A-B997-1FB16D8564C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E85F765-D2DF-41C0-A90F-732861CA32F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "26981B0C-6A7E-40BA-8F50-0C19870258FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6c:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAFEE4-35FE-44BE-90DD-1E067A1A2AAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1337:*:*:*:*:*:*:*",
              "matchCriteriaId": "053BE4FF-4699-42E8-B480-DA2224EC2BDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de enteros en VLC anterior a 0.8.6f, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s del demultiplexador (1) MP4, (2) Real y (3) el codec Cinepak, que inicia el desbordamiento de b\u00fafer."
    }
  ],
  "id": "CVE-2008-1768",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-04-25T06:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28903"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/developers/vlc/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28903"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/developers/vlc/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-01-17 01:00
Modified
2025-04-09 00:30
Severity ?
Summary
The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability.
References
cve@mitre.orghttp://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.htmlExploit
cve@mitre.orghttp://osvdb.org/42205
cve@mitre.orghttp://osvdb.org/42206
cve@mitre.orghttp://secunia.com/advisories/29284
cve@mitre.orghttp://secunia.com/advisories/29766
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1543
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
cve@mitre.orghttp://www.securityfocus.com/bid/28712
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619
cve@mitre.orghttps://trac.videolan.org/vlc/changeset/23197
cve@mitre.orghttps://trac.videolan.org/vlc/ticket/1371
af854a3a-2127-422b-91ae-364da2661108http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42205
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42206
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29766
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1543
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28712
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619
af854a3a-2127-422b-91ae-364da2661108https://trac.videolan.org/vlc/changeset/23197
af854a3a-2127-422b-91ae-364da2661108https://trac.videolan.org/vlc/ticket/1371
Impacted products
Vendor Product Version
videolan vlc 0.8.6d



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability."
    },
    {
      "lang": "es",
      "value": "La extensi\u00f3n de navegaci\u00f3n de VideoLAN VLC 0.8.6d permite a atacantes remotos sobrescribir ficheros de su elecci\u00f3n mediante (1) la opci\u00f3n :demuxdump-file en un nombre de fichero de una lista de reproducci\u00f3n, o (2) una sentencia EXTVLCOPT en un fichero MP3, posiblemente una vulnerabilidad de inyecci\u00f3n de argumento."
    }
  ],
  "id": "CVE-2007-6683",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-17T01:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42205"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42206"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28712"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://trac.videolan.org/vlc/changeset/23197"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://trac.videolan.org/vlc/ticket/1371"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42205"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42206"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://trac.videolan.org/vlc/changeset/23197"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://trac.videolan.org/vlc/ticket/1371"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-01-17 01:00
Modified
2025-04-09 00:30
Severity ?
Summary
The RTSP module in VideoLAN VLC 0.8.6d allows remote attackers to cause a denial of service (crash) via a request without a Transport parameter, which triggers a NULL pointer dereference.
Impacted products
Vendor Product Version
videolan vlc 0.8.6d



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RTSP module in VideoLAN VLC 0.8.6d allows remote attackers to cause a denial of service (crash) via a request without a Transport parameter, which triggers a NULL pointer dereference."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo RTSP de VideoLAN VLC 0.8.6d permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante una petici\u00f3n sin el par\u00e1metro Transfer, lo cual provoca una referencia a un puntero nulo."
    }
  ],
  "id": "CVE-2007-6684",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-17T01:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-September/034722.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.videolan.org/vlc/changeset/22023"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-September/034722.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.videolan.org/vlc/changeset/22023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14876"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-05-12 20:20
Modified
2025-04-09 00:30
Severity ?
Summary
Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory.
Impacted products
Vendor Product Version
videolan vlc *
videolan vlc 0.4.6
videolan vlc 0.5.0
videolan vlc 0.5.1
videolan vlc 0.5.1a
videolan vlc 0.5.2
videolan vlc 0.5.3
videolan vlc 0.6.0
videolan vlc 0.6.1
videolan vlc 0.6.2
videolan vlc 0.7.0
videolan vlc 0.7.1
videolan vlc 0.7.2
videolan vlc 0.8.0
videolan vlc 0.8.1
videolan vlc 0.8.2
videolan vlc 0.8.4
videolan vlc 0.8.4a
videolan vlc 0.8.5
videolan vlc 0.8.6a
videolan vlc 0.8.6b
videolan vlc 0.8.6c
videolan vlc 0.8.6d
videolan vlc 0.8.6e



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5ACEC7-D436-49F2-821B-EE4B1D982A55",
              "versionEndIncluding": "0.8.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBF1B20-1478-472C-B9A1-974A7A5333C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C29EDDF9-DE90-4AA7-8454-D42B4C37ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AF1C9A-FD6F-4CA4-8275-8B7655F861F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "26768501-C17C-4ABF-AB47-D4BE2C902D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B56B15F-7504-4D55-8C31-1C28F1A8129D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BB497-20F6-4CCB-A24E-7228BE68CA5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2855B3-D0ED-4C8E-95A0-151E88F95057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B90DCE-2EA9-49AA-9F63-0515C751E821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C4F8C4-EEA4-4369-BBC8-C726059C8852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2821324-7A44-40CD-95B8-F4B5B09E6D69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A98AC34-2FAB-4CAE-9D14-B4E11CC2AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "347E213C-83AF-4F98-8096-2113E00C1BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A26753D-44F2-49F6-8486-1DD61297C037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C2B1C1-1606-411D-A9CA-D1A654FD4133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BBBBAF-71F7-4F47-ADE6-FF7B590832E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC67A7B-21E0-45DA-A70F-EE97079140A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1062EB82-2A6C-4770-A339-21686FF9E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA7ECBE-1CAE-47C5-ACC1-F7BBA3946CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E85F765-D2DF-41C0-A90F-732861CA32F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "26981B0C-6A7E-40BA-8F50-0C19870258FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6c:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAFEE4-35FE-44BE-90DD-1E067A1A2AAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de b\u00fasqueda en ruta no confiable en VideoLAN VLC anterior a 0.9.0 permite a usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una librer\u00eda bajo los subdirectorios modules/ o plugins/ del directorio actual."
    }
  ],
  "id": "CVE-2008-2147",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-05-12T20:20:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31317"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.videolan.org/vlc/ticket/1578"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.videolan.org/vlc/ticket/1578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-25 00:44
Modified
2025-04-09 00:30
Severity ?
Summary
Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984.
References
cve@mitre.orghttp://secunia.com/advisories/29503
cve@mitre.orghttp://secunia.com/advisories/29766
cve@mitre.orghttp://secunia.com/advisories/29800
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-25.xml
cve@mitre.orghttp://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0aExploit
cve@mitre.orghttp://wiki.videolan.org/Changelog/0.8.6f
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1543
cve@mitre.orghttp://www.securityfocus.com/bid/28433
cve@mitre.orghttp://www.videolan.org/security/sa0803.php
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0985
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41412
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29503
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29766
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29800
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-25.xml
af854a3a-2127-422b-91ae-364da2661108http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0aExploit
af854a3a-2127-422b-91ae-364da2661108http://wiki.videolan.org/Changelog/0.8.6f
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1543
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28433
af854a3a-2127-422b-91ae-364da2661108http://www.videolan.org/security/sa0803.php
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0985
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41412
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841
Impacted products
Vendor Product Version
videolan vlc 0.8.6e



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n MP4_ReadBox_rdrf de libmp4.c para VLC 0.8.6e permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una MP4 RDRF box manipulada que dispara un desbordamiento de b\u00fafer basado en mont\u00edculo, una vulnerabilidad distinta a CVE-2008-0984."
    }
  ],
  "id": "CVE-2008-1489",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-25T00:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28433"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-01-17 01:00
Modified
2025-04-09 00:30
Severity ?
Summary
Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.
References
cve@mitre.orghttp://aluigi.altervista.org/adv/vlcboffs-adv.txt
cve@mitre.orghttp://osvdb.org/42208
cve@mitre.orghttp://secunia.com/advisories/28233
cve@mitre.orghttp://secunia.com/advisories/29284
cve@mitre.orghttp://secunia.com/advisories/29766
cve@mitre.orghttp://securityreason.com/securityalert/3550
cve@mitre.orghttp://trac.videolan.org/vlc/changeset/23839
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1543
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
cve@mitre.orghttp://www.securityfocus.com/archive/1/485488/30/0/threadedExploit
cve@mitre.orghttp://www.securityfocus.com/bid/27015
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790
cve@mitre.orghttps://www.exploit-db.com/exploits/5519
af854a3a-2127-422b-91ae-364da2661108http://aluigi.altervista.org/adv/vlcboffs-adv.txt
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42208
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28233
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29766
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3550
af854a3a-2127-422b-91ae-364da2661108http://trac.videolan.org/vlc/changeset/23839
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1543
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/485488/30/0/threadedExploit
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27015
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5519
Impacted products
Vendor Product Version
videolan vlc *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E219A8-7A7C-49A5-9978-A1470CEF3702",
              "versionEndIncluding": "0.8.6d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de cadena de formato en la funci\u00f3n httpd_FileCallBack (network/httpd.c) de VideoLAN VLC 0.8.6d permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante especificadores de cadenas de formato en el par\u00e1metro Connection."
    }
  ],
  "id": "CVE-2007-6682",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-17T01:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42208"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3550"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.videolan.org/vlc/changeset/23839"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27015"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42208"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.videolan.org/vlc/changeset/23839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5519"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-01-17 01:00
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via a long subtitle in a (1) MicroDvd, (2) SSA, and (3) Vplayer file.
References
cve@mitre.orghttp://aluigi.altervista.org/adv/vlcboffs-adv.txt
cve@mitre.orghttp://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html
cve@mitre.orghttp://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html
cve@mitre.orghttp://osvdb.org/42207
cve@mitre.orghttp://secunia.com/advisories/28233
cve@mitre.orghttp://secunia.com/advisories/29284
cve@mitre.orghttp://secunia.com/advisories/29766
cve@mitre.orghttp://secunia.com/advisories/29800
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-25.xml
cve@mitre.orghttp://securityreason.com/securityalert/3550
cve@mitre.orghttp://wiki.videolan.org/Changelog/0.8.6f
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1543
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
cve@mitre.orghttp://www.securityfocus.com/archive/1/485488/30/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/27015
cve@mitre.orghttp://www.videolan.org/security/sa0801.php
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334
cve@mitre.orghttps://www.exploit-db.com/exploits/5667
af854a3a-2127-422b-91ae-364da2661108http://aluigi.altervista.org/adv/vlcboffs-adv.txt
af854a3a-2127-422b-91ae-364da2661108http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html
af854a3a-2127-422b-91ae-364da2661108http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/42207
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28233
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29766
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29800
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-25.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3550
af854a3a-2127-422b-91ae-364da2661108http://wiki.videolan.org/Changelog/0.8.6f
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1543
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/485488/30/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/27015
af854a3a-2127-422b-91ae-364da2661108http://www.videolan.org/security/sa0801.php
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5667
Impacted products
Vendor Product Version
videolan vlc *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E219A8-7A7C-49A5-9978-A1470CEF3702",
              "versionEndIncluding": "0.8.6d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via a long subtitle in a (1) MicroDvd, (2) SSA, and (3) Vplayer file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en modules/demux/subtitle.c de VideoLAN VLC 0.8.6d permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un subt\u00edtulo largo en un fichero (1) MicroDvd, (2) SSA, y (3) Vplayer."
    }
  ],
  "id": "CVE-2007-6681",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-17T01:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/42207"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3550"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27015"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/security/sa0801.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/42207"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29766"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3550"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/security/sa0801.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5667"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-28 15:59
Modified
2025-04-20 01:37
Severity ?
Summary
VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service.
Impacted products
Vendor Product Version
videolan vlc *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F659207F-B405-40C2-8508-E32CBD916E0D",
              "versionEndIncluding": "2.1.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service."
    },
    {
      "lang": "es",
      "value": "VideoLAN VLC media player en versiones anteriores a 2.1.5 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2014-6440",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-28T15:59:00.160",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://seclists.org/oss-sec/2015/q1/751"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/72950"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://security.gentoo.org/glsa/201603-08"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://seclists.org/oss-sec/2015/q1/751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/72950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://security.gentoo.org/glsa/201603-08"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-04-25 06:05
Modified
2025-04-09 00:30
Severity ?
Summary
VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption.
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=214627#c3
cve@mitre.orghttp://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98
cve@mitre.orghttp://secunia.com/advisories/29503
cve@mitre.orghttp://secunia.com/advisories/29800
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-25.xml
cve@mitre.orghttp://wiki.videolan.org/Changelog/0.8.6f
cve@mitre.orghttp://www.securityfocus.com/bid/28904
cve@mitre.orghttp://www.videolan.org/developers/vlc/NEWS
cve@mitre.orghttp://www.videolan.org/security/sa0803.php
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0985
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=214627#c3
af854a3a-2127-422b-91ae-364da2661108http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29503
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29800
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-25.xml
af854a3a-2127-422b-91ae-364da2661108http://wiki.videolan.org/Changelog/0.8.6f
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28904
af854a3a-2127-422b-91ae-364da2661108http://www.videolan.org/developers/vlc/NEWS
af854a3a-2127-422b-91ae-364da2661108http://www.videolan.org/security/sa0803.php
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0985
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445
Impacted products
Vendor Product Version
videolan vlc 0.1.99
videolan vlc 0.1.99a
videolan vlc 0.1.99b
videolan vlc 0.1.99c
videolan vlc 0.1.99d
videolan vlc 0.1.99e
videolan vlc 0.1.99f
videolan vlc 0.1.99g
videolan vlc 0.1.99h
videolan vlc 0.1.99i
videolan vlc 0.2.0
videolan vlc 0.2.50
videolan vlc 0.2.60
videolan vlc 0.2.61
videolan vlc 0.2.62
videolan vlc 0.2.63
videolan vlc 0.2.70
videolan vlc 0.2.71
videolan vlc 0.2.72
videolan vlc 0.2.73
videolan vlc 0.2.80
videolan vlc 0.2.81
videolan vlc 0.2.82
videolan vlc 0.2.83
videolan vlc 0.2.90
videolan vlc 0.2.91
videolan vlc 0.2.92
videolan vlc 0.3.0
videolan vlc 0.3.1
videolan vlc 0.4.0
videolan vlc 0.4.1
videolan vlc 0.4.2
videolan vlc 0.4.3
videolan vlc 0.4.3_ac3
videolan vlc 0.4.4
videolan vlc 0.4.5
videolan vlc 0.4.6
videolan vlc 0.5.0
videolan vlc 0.5.1
videolan vlc 0.5.2
videolan vlc 0.5.3
videolan vlc 0.6.0
videolan vlc 0.6.1
videolan vlc 0.6.2
videolan vlc 0.7.0
videolan vlc 0.7.1
videolan vlc 0.7.2
videolan vlc 0.8.0
videolan vlc 0.8.1
videolan vlc 0.8.2
videolan vlc 0.8.4
videolan vlc 0.8.4a
videolan vlc 0.8.5
videolan vlc 0.8.6
videolan vlc 0.8.6a
videolan vlc 0.8.6b
videolan vlc 0.8.6c
videolan vlc 0.8.6d
videolan vlc 0.8.6e
videolan vlc 0.8.1337



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "929E49D1-B8F6-4A25-A93F-D8211520ED61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B61BB1FD-6D2A-42EA-9824-9A8FD728B4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99b:*:*:*:*:*:*:*",
              "matchCriteriaId": "76DDF802-26C2-437E-BB01-F01209FFE0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99c:*:*:*:*:*:*:*",
              "matchCriteriaId": "546BAE28-5B2A-4856-8B2A-316D9AD2F5A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99d:*:*:*:*:*:*:*",
              "matchCriteriaId": "56926B35-987F-4C12-9FBC-61BF7CEE1541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8FAE03-C528-4BAD-823E-EEEC4368113D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99f:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5B604B-5A7A-450A-8252-60FDCB114283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99g:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FCD5D6-A4A9-48CD-BD0E-296FD1032907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99h:*:*:*:*:*:*:*",
              "matchCriteriaId": "5624A925-C0D8-4E85-9B32-085BB9059FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.1.99i:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E35B1D-3191-4E18-B265-ACA736A87645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60FCBA5D-568F-424B-BFB1-1BA41DB0D6B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "656BBC4D-8569-4A91-87DF-93D053BEEC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9C7B19-59F4-43FB-8122-AAD36ABDF807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2DB4C0-CCEE-40D6-B227-E00A002D755B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE9872-10B5-466E-BEE4-69B6451076C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6125D6E-6416-49E8-8770-5C0590F3FA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "27122F7C-1D19-41D8-B323-A6941D0DE193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "6068DB81-542B-43F0-9B42-CEA7689F61D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "A009555D-CC59-4C6A-B350-E7F4730F5B7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "3299D365-015F-4A95-80C3-977853E70E1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "47EC751E-FB47-4263-B9ED-FBBAAEA677F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA7C125-989A-4727-9E59-44ACC1750E6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC105DEB-DE1F-4183-8A4A-F7E58FBB82C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "521F12A2-7785-48C9-BB11-E91CEF61584F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A412BA-A195-4893-B5F8-EE6FC9A53326",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6ADA95A-A8B2-4E3E-A3E4-AEA03B14C339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.2.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7823310-E6C2-42D6-A0CC-8D2A0CA5EB6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBE2DF23-1CF5-4371-82EF-7072B0FCC226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F706E26-E58D-4B5C-98AC-A386BF7ABC24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19F3E58-0D65-45AF-8024-E3A7CFD05142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B24956D-A924-40BC-A340-3BE9DD3CCBA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F94AC83A-6790-4E26-A4B8-E2B4394CB3FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD6F543A-8520-4F13-9C03-9520A6B92944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.3_ac3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3991F10-CFC4-4979-B5D4-F9EFB9992683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FC4A5C-5A0A-40CF-891B-97443CC4A367",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6656C05D-4A4B-47DE-9844-308FD98CFF04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CBF1B20-1478-472C-B9A1-974A7A5333C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C29EDDF9-DE90-4AA7-8454-D42B4C37ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AF1C9A-FD6F-4CA4-8275-8B7655F861F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B56B15F-7504-4D55-8C31-1C28F1A8129D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BB497-20F6-4CCB-A24E-7228BE68CA5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2855B3-D0ED-4C8E-95A0-151E88F95057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B90DCE-2EA9-49AA-9F63-0515C751E821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C4F8C4-EEA4-4369-BBC8-C726059C8852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2821324-7A44-40CD-95B8-F4B5B09E6D69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A98AC34-2FAB-4CAE-9D14-B4E11CC2AFB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "347E213C-83AF-4F98-8096-2113E00C1BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A26753D-44F2-49F6-8486-1DD61297C037",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C2B1C1-1606-411D-A9CA-D1A654FD4133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "28BBBBAF-71F7-4F47-ADE6-FF7B590832E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC67A7B-21E0-45DA-A70F-EE97079140A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1062EB82-2A6C-4770-A339-21686FF9E923",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA7ECBE-1CAE-47C5-ACC1-F7BBA3946CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A23534-3DF7-422A-B997-1FB16D8564C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E85F765-D2DF-41C0-A90F-732861CA32F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "26981B0C-6A7E-40BA-8F50-0C19870258FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6c:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAFEE4-35FE-44BE-90DD-1E067A1A2AAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "686E1C6D-CDE6-4615-B983-3BCDDDE921AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.1337:*:*:*:*:*:*:*",
              "matchCriteriaId": "053BE4FF-4699-42E8-B480-DA2224EC2BDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption."
    },
    {
      "lang": "es",
      "value": "VLC versions anteriores a la 0.8.6f, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un Cinepak manipulado que dispara un acceso a array fuera de l\u00edmite y una corrupci\u00f3n de memoria."
    }
  ],
  "id": "CVE-2008-1769",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-04-25T06:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28904"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/developers/vlc/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28904"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/developers/vlc/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.videolan.org/security/sa0803.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0985"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-04-17 23:05
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file. NOTE: this issue is due to an incomplete fix for CVE-2007-6681.
References
cve@mitre.orghttp://aluigi.altervista.org/adv/vlcboffs-adv.txt
cve@mitre.orghttp://aluigi.org/adv/vlcboffs-adv.txt
cve@mitre.orghttp://secunia.com/advisories/28233
cve@mitre.orghttp://secunia.com/advisories/29800
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200804-25.xml
cve@mitre.orghttp://wiki.videolan.org/Changelog/0.8.6f
cve@mitre.orghttp://www.securityfocus.com/archive/1/489698
cve@mitre.orghttp://www.securityfocus.com/bid/28251
cve@mitre.orghttp://www.securityfocus.com/bid/28274
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41237
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41936
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872
cve@mitre.orghttps://www.exploit-db.com/exploits/5250
af854a3a-2127-422b-91ae-364da2661108http://aluigi.altervista.org/adv/vlcboffs-adv.txt
af854a3a-2127-422b-91ae-364da2661108http://aluigi.org/adv/vlcboffs-adv.txt
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28233
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29800
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200804-25.xml
af854a3a-2127-422b-91ae-364da2661108http://wiki.videolan.org/Changelog/0.8.6f
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/489698
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28251
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28274
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41237
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41936
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5250
Impacted products
Vendor Product Version
videolan vlc 0.8.6e



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:videolan:vlc:0.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6545867A-07ED-4E16-AED0-566C5CCD46FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file.  NOTE: this issue is due to an incomplete fix for CVE-2007-6681."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n ParseSSA (modules/demux/subtitle.c) en VLC 0.8.6e permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un subtitulo largeo en un archivo SSA. NOTA: este problema es debido a una correcci\u00f3n incompleta para CVE-2007-6681."
    }
  ],
  "id": "CVE-2008-1881",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-04-17T23:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489698"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28251"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28274"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.videolan.org/Changelog/0.8.6f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489698"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28274"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5250"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-6440 (GCVE-0-2014-6440)
Vulnerability from cvelistv5
Published
2017-03-28 15:00
Modified
2024-08-06 12:17
Severity ?
CWE
  • n/a
Summary
VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:17:23.884Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
          },
          {
            "name": "72950",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/72950"
          },
          {
            "name": "GLSA-201603-08",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201603-08"
          },
          {
            "name": "[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2015/q1/751"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-03-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-28T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
        },
        {
          "name": "72950",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/72950"
        },
        {
          "name": "GLSA-201603-08",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201603-08"
        },
        {
          "name": "[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2015/q1/751"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-6440",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.videolan.org/developers/vlc-branch/NEWS",
              "refsource": "MISC",
              "url": "http://www.videolan.org/developers/vlc-branch/NEWS"
            },
            {
              "name": "72950",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/72950"
            },
            {
              "name": "GLSA-201603-08",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201603-08"
            },
            {
              "name": "[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2015/q1/751"
            },
            {
              "name": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/",
              "refsource": "MISC",
              "url": "http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-6440",
    "datePublished": "2017-03-28T15:00:00",
    "dateReserved": "2014-09-16T00:00:00",
    "dateUpdated": "2024-08-06T12:17:23.884Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8311 (GCVE-0-2017-8311)
Vulnerability from cvelistv5
Published
2017-05-23 21:00
Modified
2024-08-05 16:34
Severity ?
CWE
  • Allows attacker to execute arbitrary code.
Summary
Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file.
References
Impacted products
Vendor Product Version
VideoLAN VLC Version: <2.2.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:22.584Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "44514",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/44514/"
          },
          {
            "name": "98634",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98634"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=775de716add17322f24b476439f903a829446eb6"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c2.2.5"
            }
          ]
        }
      ],
      "datePublic": "2017-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to execute arbitrary code.",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-26T09:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "44514",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/44514/"
        },
        {
          "name": "98634",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98634"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=775de716add17322f24b476439f903a829446eb6"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8311",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c2.2.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to execute arbitrary code."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "44514",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/44514/"
            },
            {
              "name": "98634",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98634"
            },
            {
              "name": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=775de716add17322f24b476439f903a829446eb6",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc.git;a=commitdiff;h=775de716add17322f24b476439f903a829446eb6"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8311",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:22.584Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-6683 (GCVE-0-2007-6683)
Vulnerability from cvelistv5
Published
2008-01-17 00:00
Modified
2024-08-07 16:18
Severity ?
CWE
  • n/a
Summary
The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability.
References
http://www.securityfocus.com/bid/28712 vdb-entry, x_refsource_BID
http://secunia.com/advisories/29284 third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/42205 vdb-entry, x_refsource_OSVDB
http://www.debian.org/security/2008/dsa-1543 vendor-advisory, x_refsource_DEBIAN
http://osvdb.org/42206 vdb-entry, x_refsource_OSVDB
http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html mailing-list, x_refsource_MLIST
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619 vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/29766 third-party-advisory, x_refsource_SECUNIA
https://trac.videolan.org/vlc/ticket/1371 x_refsource_CONFIRM
https://trac.videolan.org/vlc/changeset/23197 x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:18:20.281Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "28712",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28712"
          },
          {
            "name": "29284",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29284"
          },
          {
            "name": "42205",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42205"
          },
          {
            "name": "DSA-1543",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1543"
          },
          {
            "name": "42206",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42206"
          },
          {
            "name": "[vlc-devel] 20071226 Regarding \"obscure\" security problem",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html"
          },
          {
            "name": "oval:org.mitre.oval:def:14619",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619"
          },
          {
            "name": "29766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29766"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://trac.videolan.org/vlc/ticket/1371"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://trac.videolan.org/vlc/changeset/23197"
          },
          {
            "name": "GLSA-200803-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "28712",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28712"
        },
        {
          "name": "29284",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29284"
        },
        {
          "name": "42205",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42205"
        },
        {
          "name": "DSA-1543",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1543"
        },
        {
          "name": "42206",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42206"
        },
        {
          "name": "[vlc-devel] 20071226 Regarding \"obscure\" security problem",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html"
        },
        {
          "name": "oval:org.mitre.oval:def:14619",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619"
        },
        {
          "name": "29766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29766"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://trac.videolan.org/vlc/ticket/1371"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://trac.videolan.org/vlc/changeset/23197"
        },
        {
          "name": "GLSA-200803-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6683",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "28712",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28712"
            },
            {
              "name": "29284",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29284"
            },
            {
              "name": "42205",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42205"
            },
            {
              "name": "DSA-1543",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1543"
            },
            {
              "name": "42206",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42206"
            },
            {
              "name": "[vlc-devel] 20071226 Regarding \"obscure\" security problem",
              "refsource": "MLIST",
              "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html"
            },
            {
              "name": "oval:org.mitre.oval:def:14619",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619"
            },
            {
              "name": "29766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29766"
            },
            {
              "name": "https://trac.videolan.org/vlc/ticket/1371",
              "refsource": "CONFIRM",
              "url": "https://trac.videolan.org/vlc/ticket/1371"
            },
            {
              "name": "https://trac.videolan.org/vlc/changeset/23197",
              "refsource": "CONFIRM",
              "url": "https://trac.videolan.org/vlc/changeset/23197"
            },
            {
              "name": "GLSA-200803-13",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6683",
    "datePublished": "2008-01-17T00:00:00",
    "dateReserved": "2008-01-16T00:00:00",
    "dateUpdated": "2024-08-07T16:18:20.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1489 (GCVE-0-2008-1489)
Vulnerability from cvelistv5
Published
2008-03-25 00:00
Modified
2024-08-07 08:24
Severity ?
CWE
  • n/a
Summary
Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:24:42.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1543",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1543"
          },
          {
            "name": "28433",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28433"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0803.php"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "oval:org.mitre.oval:def:14841",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
          },
          {
            "name": "29766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29766"
          },
          {
            "name": "29503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29503"
          },
          {
            "name": "ADV-2008-0985",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0985"
          },
          {
            "name": "vlcmediaplayer-mp4readbox-rdrf-bo(41412)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1543",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1543"
        },
        {
          "name": "28433",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28433"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0803.php"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "oval:org.mitre.oval:def:14841",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
        },
        {
          "name": "29766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29766"
        },
        {
          "name": "29503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29503"
        },
        {
          "name": "ADV-2008-0985",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0985"
        },
        {
          "name": "vlcmediaplayer-mp4readbox-rdrf-bo(41412)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1489",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the MP4_ReadBox_rdrf function in libmp4.c for VLC 0.8.6e allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MP4 RDRF box that triggers a heap-based buffer overflow, a different vulnerability than CVE-2008-0984."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1543",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1543"
            },
            {
              "name": "28433",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28433"
            },
            {
              "name": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a",
              "refsource": "CONFIRM",
              "url": "http://trac.videolan.org/vlc/changeset/09572892df7e72c0d4e598c0b5e076cf330d8b0a"
            },
            {
              "name": "http://www.videolan.org/security/sa0803.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0803.php"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "oval:org.mitre.oval:def:14841",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14841"
            },
            {
              "name": "29766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29766"
            },
            {
              "name": "29503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29503"
            },
            {
              "name": "ADV-2008-0985",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0985"
            },
            {
              "name": "vlcmediaplayer-mp4readbox-rdrf-bo(41412)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41412"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1489",
    "datePublished": "2008-03-25T00:00:00",
    "dateReserved": "2008-03-24T00:00:00",
    "dateUpdated": "2024-08-07T08:24:42.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8310 (GCVE-0-2017-8310)
Vulnerability from cvelistv5
Published
2017-05-23 21:00
Modified
2024-08-05 16:34
Severity ?
CWE
  • Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)
Summary
Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file.
Impacted products
Vendor Product Version
VideoLAN VLC Version: 2.2.*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:21.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "98638",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98638"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=blobdiff%3Bf=modules/codec/subsdec.c%3Bh=addd8c71f30d53558fffd19059b374be45cf0f8e%3Bhp=1b4276e299a2a6668047231d29ac705ae93076ba%3Bhb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328%3Bhpb=3477dba3d506de8d95bccef2c6b67861188f6c29"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "2.2.*"
            }
          ]
        }
      ],
      "datePublic": "2017-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "98638",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98638"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=blobdiff%3Bf=modules/codec/subsdec.c%3Bh=addd8c71f30d53558fffd19059b374be45cf0f8e%3Bhp=1b4276e299a2a6668047231d29ac705ae93076ba%3Bhb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328%3Bhpb=3477dba3d506de8d95bccef2c6b67861188f6c29"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8310",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.2.*"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "98638",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98638"
            },
            {
              "name": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=blobdiff;f=modules/codec/subsdec.c;h=addd8c71f30d53558fffd19059b374be45cf0f8e;hp=1b4276e299a2a6668047231d29ac705ae93076ba;hb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328;hpb=3477dba3d506de8d95bccef2c6b67861188f6c29",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=blobdiff;f=modules/codec/subsdec.c;h=addd8c71f30d53558fffd19059b374be45cf0f8e;hp=1b4276e299a2a6668047231d29ac705ae93076ba;hb=7cac839692ab79dbfe5e4ebd4c4e37d9a8b1b328;hpb=3477dba3d506de8d95bccef2c6b67861188f6c29"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8310",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:21.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8312 (GCVE-0-2017-8312)
Vulnerability from cvelistv5
Published
2017-05-23 21:00
Modified
2024-08-05 16:34
Severity ?
CWE
  • Allows attacker to read heap uninitialized data (potentially beyond allocated data - depends on heap implementation).
Summary
Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file.
Impacted products
Vendor Product Version
VideoLAN VLC Version: All
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:22.183Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "98631",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98631"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc.git%3Ba=blobdiff%3Bf=modules/demux/subtitle.c%3Bh=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3%3Bhp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974%3Bhb=611398fc8d32f3fe4331f60b220c52ba3557beaa%3Bhpb=075bc7169b05b004fa0250e4a4ce5516b05487a9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "All"
            }
          ]
        }
      ],
      "datePublic": "2017-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to read heap uninitialized data (potentially beyond allocated data - depends on heap implementation).",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "98631",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98631"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc.git%3Ba=blobdiff%3Bf=modules/demux/subtitle.c%3Bh=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3%3Bhp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974%3Bhb=611398fc8d32f3fe4331f60b220c52ba3557beaa%3Bhpb=075bc7169b05b004fa0250e4a4ce5516b05487a9"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8312",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to read heap uninitialized data (potentially beyond allocated data - depends on heap implementation)."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "98631",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98631"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            },
            {
              "name": "http://git.videolan.org/?p=vlc.git;a=blobdiff;f=modules/demux/subtitle.c;h=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3;hp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974;hb=611398fc8d32f3fe4331f60b220c52ba3557beaa;hpb=075bc7169b05b004fa0250e4a4ce5516b05487a9",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc.git;a=blobdiff;f=modules/demux/subtitle.c;h=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3;hp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974;hb=611398fc8d32f3fe4331f60b220c52ba3557beaa;hpb=075bc7169b05b004fa0250e4a4ce5516b05487a9"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8312",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:22.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-6684 (GCVE-0-2007-6684)
Vulnerability from cvelistv5
Published
2008-01-17 00:00
Modified
2024-08-07 16:18
Severity ?
CWE
  • n/a
Summary
The RTSP module in VideoLAN VLC 0.8.6d allows remote attackers to cause a denial of service (crash) via a request without a Transport parameter, which triggers a NULL pointer dereference.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:18:20.238Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29284",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29284"
          },
          {
            "name": "oval:org.mitre.oval:def:14876",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14876"
          },
          {
            "name": "[vlc-devel] 20070915 vlc: svn commit r22023 (courmisch)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-September/034722.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.videolan.org/vlc/changeset/22023"
          },
          {
            "name": "GLSA-200803-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-09-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The RTSP module in VideoLAN VLC 0.8.6d allows remote attackers to cause a denial of service (crash) via a request without a Transport parameter, which triggers a NULL pointer dereference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29284",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29284"
        },
        {
          "name": "oval:org.mitre.oval:def:14876",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14876"
        },
        {
          "name": "[vlc-devel] 20070915 vlc: svn commit r22023 (courmisch)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-September/034722.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.videolan.org/vlc/changeset/22023"
        },
        {
          "name": "GLSA-200803-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6684",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The RTSP module in VideoLAN VLC 0.8.6d allows remote attackers to cause a denial of service (crash) via a request without a Transport parameter, which triggers a NULL pointer dereference."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29284",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29284"
            },
            {
              "name": "oval:org.mitre.oval:def:14876",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14876"
            },
            {
              "name": "[vlc-devel] 20070915 vlc: svn commit r22023 (courmisch)",
              "refsource": "MLIST",
              "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-September/034722.html"
            },
            {
              "name": "http://trac.videolan.org/vlc/changeset/22023",
              "refsource": "CONFIRM",
              "url": "http://trac.videolan.org/vlc/changeset/22023"
            },
            {
              "name": "GLSA-200803-13",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6684",
    "datePublished": "2008-01-17T00:00:00",
    "dateReserved": "2008-01-16T00:00:00",
    "dateUpdated": "2024-08-07T16:18:20.238Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-6682 (GCVE-0-2007-6682)
Vulnerability from cvelistv5
Published
2008-01-17 00:00
Modified
2024-08-07 16:18
Severity ?
CWE
  • n/a
Summary
Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.
References
http://secunia.com/advisories/29284 third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1543 vendor-advisory, x_refsource_DEBIAN
http://securityreason.com/securityalert/3550 third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/28233 third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790 vdb-entry, signature, x_refsource_OVAL
https://www.exploit-db.com/exploits/5519 exploit, x_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/27015 vdb-entry, x_refsource_BID
http://osvdb.org/42208 vdb-entry, x_refsource_OSVDB
http://trac.videolan.org/vlc/changeset/23839 x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/485488/30/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/29766 third-party-advisory, x_refsource_SECUNIA
http://aluigi.altervista.org/adv/vlcboffs-adv.txt x_refsource_MISC
http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:18:20.612Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29284",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29284"
          },
          {
            "name": "DSA-1543",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1543"
          },
          {
            "name": "3550",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3550"
          },
          {
            "name": "28233",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28233"
          },
          {
            "name": "oval:org.mitre.oval:def:14790",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790"
          },
          {
            "name": "5519",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5519"
          },
          {
            "name": "27015",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27015"
          },
          {
            "name": "42208",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42208"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.videolan.org/vlc/changeset/23839"
          },
          {
            "name": "20071224 Buffer-overflow and format string in VideoLAN VLC 0.8.6d",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
          },
          {
            "name": "29766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29766"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
          },
          {
            "name": "GLSA-200803-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29284",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29284"
        },
        {
          "name": "DSA-1543",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1543"
        },
        {
          "name": "3550",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3550"
        },
        {
          "name": "28233",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28233"
        },
        {
          "name": "oval:org.mitre.oval:def:14790",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790"
        },
        {
          "name": "5519",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5519"
        },
        {
          "name": "27015",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27015"
        },
        {
          "name": "42208",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42208"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.videolan.org/vlc/changeset/23839"
        },
        {
          "name": "20071224 Buffer-overflow and format string in VideoLAN VLC 0.8.6d",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
        },
        {
          "name": "29766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29766"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
        },
        {
          "name": "GLSA-200803-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6682",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29284",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29284"
            },
            {
              "name": "DSA-1543",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1543"
            },
            {
              "name": "3550",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3550"
            },
            {
              "name": "28233",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28233"
            },
            {
              "name": "oval:org.mitre.oval:def:14790",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14790"
            },
            {
              "name": "5519",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5519"
            },
            {
              "name": "27015",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27015"
            },
            {
              "name": "42208",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42208"
            },
            {
              "name": "http://trac.videolan.org/vlc/changeset/23839",
              "refsource": "CONFIRM",
              "url": "http://trac.videolan.org/vlc/changeset/23839"
            },
            {
              "name": "20071224 Buffer-overflow and format string in VideoLAN VLC 0.8.6d",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
            },
            {
              "name": "29766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29766"
            },
            {
              "name": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
            },
            {
              "name": "GLSA-200803-13",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6682",
    "datePublished": "2008-01-17T00:00:00",
    "dateReserved": "2008-01-16T00:00:00",
    "dateUpdated": "2024-08-07T16:18:20.612Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-8313 (GCVE-0-2017-8313)
Vulnerability from cvelistv5
Published
2017-05-23 21:00
Modified
2024-08-05 16:34
Severity ?
CWE
  • Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service).
Summary
Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file.
Impacted products
Vendor Product Version
VideoLAN VLC Version: < 2.2.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T16:34:22.885Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201707-10",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201707-10"
          },
          {
            "name": "98633",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98633"
          },
          {
            "name": "DSA-3899",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3899"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=commitdiff%3Bh=05b653355ce303ada3b5e0e645ae717fea39186c"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VLC",
          "vendor": "VideoLAN",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 2.2.5"
            }
          ]
        }
      ],
      "datePublic": "2017-04-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service).",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
        "shortName": "checkpoint"
      },
      "references": [
        {
          "name": "GLSA-201707-10",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201707-10"
        },
        {
          "name": "98633",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98633"
        },
        {
          "name": "DSA-3899",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3899"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git%3Ba=commitdiff%3Bh=05b653355ce303ada3b5e0e645ae717fea39186c"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@checkpoint.com",
          "ID": "CVE-2017-8313",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VLC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003c 2.2.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VideoLAN"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap out-of-bound read in ParseJSS in VideoLAN VLC before 2.2.5 due to missing check of string termination allows attackers to read data beyond allocated memory and potentially crash the process via a crafted subtitles file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Allows attacker to read data beyond allocated memory and potentially crash the process (causing a denial of service)."
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201707-10",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201707-10"
            },
            {
              "name": "98633",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98633"
            },
            {
              "name": "DSA-3899",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3899"
            },
            {
              "name": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=commitdiff;h=05b653355ce303ada3b5e0e645ae717fea39186c",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc/vlc-2.2.git;a=commitdiff;h=05b653355ce303ada3b5e0e645ae717fea39186c"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
    "assignerShortName": "checkpoint",
    "cveId": "CVE-2017-8313",
    "datePublished": "2017-05-23T21:00:00",
    "dateReserved": "2017-04-28T00:00:00",
    "dateUpdated": "2024-08-05T16:34:22.885Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-6681 (GCVE-0-2007-6681)
Vulnerability from cvelistv5
Published
2008-01-17 00:00
Modified
2024-08-07 16:18
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via a long subtitle in a (1) MicroDvd, (2) SSA, and (3) Vplayer file.
References
http://secunia.com/advisories/29284 third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1543 vendor-advisory, x_refsource_DEBIAN
http://securityreason.com/securityalert/3550 third-party-advisory, x_refsource_SREASON
https://www.exploit-db.com/exploits/5667 exploit, x_refsource_EXPLOIT-DB
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334 vdb-entry, signature, x_refsource_OVAL
http://www.videolan.org/security/sa0801.php x_refsource_CONFIRM
http://secunia.com/advisories/28233 third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200804-25.xml vendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/27015 vdb-entry, x_refsource_BID
http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html mailing-list, x_refsource_MLIST
http://wiki.videolan.org/Changelog/0.8.6f x_refsource_CONFIRM
http://secunia.com/advisories/29800 third-party-advisory, x_refsource_SECUNIA
http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html mailing-list, x_refsource_MLIST
http://www.securityfocus.com/archive/1/485488/30/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/29766 third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/42207 vdb-entry, x_refsource_OSVDB
http://aluigi.altervista.org/adv/vlcboffs-adv.txt x_refsource_MISC
http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:18:20.564Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29284",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29284"
          },
          {
            "name": "DSA-1543",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1543"
          },
          {
            "name": "3550",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3550"
          },
          {
            "name": "5667",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5667"
          },
          {
            "name": "oval:org.mitre.oval:def:14334",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0801.php"
          },
          {
            "name": "28233",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28233"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "name": "27015",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27015"
          },
          {
            "name": "[vlc-devel] 20070630 vlc: svn commit r20715 (fenrir)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "[vlc-devel] 20070626 subtitle processing overflows",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html"
          },
          {
            "name": "20071224 Buffer-overflow and format string in VideoLAN VLC 0.8.6d",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
          },
          {
            "name": "29766",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29766"
          },
          {
            "name": "42207",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/42207"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
          },
          {
            "name": "GLSA-200803-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via a long subtitle in a (1) MicroDvd, (2) SSA, and (3) Vplayer file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29284",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29284"
        },
        {
          "name": "DSA-1543",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1543"
        },
        {
          "name": "3550",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3550"
        },
        {
          "name": "5667",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5667"
        },
        {
          "name": "oval:org.mitre.oval:def:14334",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0801.php"
        },
        {
          "name": "28233",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28233"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "name": "27015",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27015"
        },
        {
          "name": "[vlc-devel] 20070630 vlc: svn commit r20715 (fenrir)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "[vlc-devel] 20070626 subtitle processing overflows",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html"
        },
        {
          "name": "20071224 Buffer-overflow and format string in VideoLAN VLC 0.8.6d",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
        },
        {
          "name": "29766",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29766"
        },
        {
          "name": "42207",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/42207"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
        },
        {
          "name": "GLSA-200803-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6681",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via a long subtitle in a (1) MicroDvd, (2) SSA, and (3) Vplayer file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29284",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29284"
            },
            {
              "name": "DSA-1543",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1543"
            },
            {
              "name": "3550",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3550"
            },
            {
              "name": "5667",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5667"
            },
            {
              "name": "oval:org.mitre.oval:def:14334",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14334"
            },
            {
              "name": "http://www.videolan.org/security/sa0801.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0801.php"
            },
            {
              "name": "28233",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28233"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "27015",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27015"
            },
            {
              "name": "[vlc-devel] 20070630 vlc: svn commit r20715 (fenrir)",
              "refsource": "MLIST",
              "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/033394.html"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "[vlc-devel] 20070626 subtitle processing overflows",
              "refsource": "MLIST",
              "url": "http://mailman.videolan.org/pipermail/vlc-devel/2007-June/032672.html"
            },
            {
              "name": "20071224 Buffer-overflow and format string in VideoLAN VLC 0.8.6d",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/485488/30/0/threaded"
            },
            {
              "name": "29766",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29766"
            },
            {
              "name": "42207",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/42207"
            },
            {
              "name": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
            },
            {
              "name": "GLSA-200803-13",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6681",
    "datePublished": "2008-01-17T00:00:00",
    "dateReserved": "2008-01-16T00:00:00",
    "dateUpdated": "2024-08-07T16:18:20.564Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1769 (GCVE-0-2008-1769)
Vulnerability from cvelistv5
Published
2008-04-24 18:00
Modified
2024-08-07 08:32
Severity ?
CWE
  • n/a
Summary
VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:32:01.282Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0803.php"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/developers/vlc/NEWS"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "28904",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28904"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "oval:org.mitre.oval:def:14445",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
          },
          {
            "name": "29503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29503"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
          },
          {
            "name": "ADV-2008-0985",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0985"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0803.php"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit%3Bh=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/developers/vlc/NEWS"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "28904",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28904"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "oval:org.mitre.oval:def:14445",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
        },
        {
          "name": "29503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29503"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
        },
        {
          "name": "ADV-2008-0985",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0985"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1769",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via a crafted Cinepak file that triggers an out-of-bounds array access and memory corruption."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.videolan.org/security/sa0803.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0803.php"
            },
            {
              "name": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=cf489d7bff3c1b36b2d5501ecf21129c78104d98",
              "refsource": "MISC",
              "url": "http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=cf489d7bff3c1b36b2d5501ecf21129c78104d98"
            },
            {
              "name": "http://www.videolan.org/developers/vlc/NEWS",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/developers/vlc/NEWS"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "28904",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28904"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "oval:org.mitre.oval:def:14445",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14445"
            },
            {
              "name": "29503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29503"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3",
              "refsource": "MISC",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=214627#c3"
            },
            {
              "name": "ADV-2008-0985",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0985"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1769",
    "datePublished": "2008-04-24T18:00:00",
    "dateReserved": "2008-04-12T00:00:00",
    "dateUpdated": "2024-08-07T08:32:01.282Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1768 (GCVE-0-2008-1768)
Vulnerability from cvelistv5
Published
2008-04-24 18:00
Modified
2024-08-07 08:32
Severity ?
CWE
  • n/a
Summary
Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow.
References
http://www.videolan.org/security/sa0803.php x_refsource_CONFIRM
http://www.securityfocus.com/bid/28903 vdb-entry, x_refsource_BID
http://www.videolan.org/developers/vlc/NEWS x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200804-25.xml vendor-advisory, x_refsource_GENTOO
http://wiki.videolan.org/Changelog/0.8.6f x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412 vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/29800 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29503 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/0985 vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:32:01.266Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/security/sa0803.php"
          },
          {
            "name": "28903",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28903"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.videolan.org/developers/vlc/NEWS"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "oval:org.mitre.oval:def:14412",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "29503",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29503"
          },
          {
            "name": "ADV-2008-0985",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0985"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-04-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/security/sa0803.php"
        },
        {
          "name": "28903",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28903"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.videolan.org/developers/vlc/NEWS"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "oval:org.mitre.oval:def:14412",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "29503",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29503"
        },
        {
          "name": "ADV-2008-0985",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0985"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1768",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.videolan.org/security/sa0803.php",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/security/sa0803.php"
            },
            {
              "name": "28903",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28903"
            },
            {
              "name": "http://www.videolan.org/developers/vlc/NEWS",
              "refsource": "CONFIRM",
              "url": "http://www.videolan.org/developers/vlc/NEWS"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "oval:org.mitre.oval:def:14412",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "29503",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29503"
            },
            {
              "name": "ADV-2008-0985",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0985"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1768",
    "datePublished": "2008-04-24T18:00:00",
    "dateReserved": "2008-04-12T00:00:00",
    "dateUpdated": "2024-08-07T08:32:01.266Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-1881 (GCVE-0-2008-1881)
Vulnerability from cvelistv5
Published
2008-04-17 23:00
Modified
2024-08-07 08:40
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file. NOTE: this issue is due to an incomplete fix for CVE-2007-6681.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:40:59.548Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "vlc-parsessa-bo(41936)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
          },
          {
            "name": "20080317 VLC highlander bug",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489698"
          },
          {
            "name": "28233",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28233"
          },
          {
            "name": "GLSA-200804-25",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.videolan.org/Changelog/0.8.6f"
          },
          {
            "name": "28274",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28274"
          },
          {
            "name": "29800",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29800"
          },
          {
            "name": "oval:org.mitre.oval:def:14872",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
          },
          {
            "name": "5250",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5250"
          },
          {
            "name": "vlcmediaplayer-subtitle-bo(41237)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
          },
          {
            "name": "28251",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28251"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file.  NOTE: this issue is due to an incomplete fix for CVE-2007-6681."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "vlc-parsessa-bo(41936)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
        },
        {
          "name": "20080317 VLC highlander bug",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489698"
        },
        {
          "name": "28233",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28233"
        },
        {
          "name": "GLSA-200804-25",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.videolan.org/Changelog/0.8.6f"
        },
        {
          "name": "28274",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28274"
        },
        {
          "name": "29800",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29800"
        },
        {
          "name": "oval:org.mitre.oval:def:14872",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
        },
        {
          "name": "5250",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5250"
        },
        {
          "name": "vlcmediaplayer-subtitle-bo(41237)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
        },
        {
          "name": "28251",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28251"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1881",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e allows remote attackers to execute arbitrary code via a long subtitle in an SSA file.  NOTE: this issue is due to an incomplete fix for CVE-2007-6681."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "vlc-parsessa-bo(41936)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41936"
            },
            {
              "name": "http://aluigi.org/adv/vlcboffs-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.org/adv/vlcboffs-adv.txt"
            },
            {
              "name": "20080317 VLC highlander bug",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489698"
            },
            {
              "name": "28233",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28233"
            },
            {
              "name": "GLSA-200804-25",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200804-25.xml"
            },
            {
              "name": "http://wiki.videolan.org/Changelog/0.8.6f",
              "refsource": "CONFIRM",
              "url": "http://wiki.videolan.org/Changelog/0.8.6f"
            },
            {
              "name": "28274",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28274"
            },
            {
              "name": "29800",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29800"
            },
            {
              "name": "oval:org.mitre.oval:def:14872",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14872"
            },
            {
              "name": "5250",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5250"
            },
            {
              "name": "vlcmediaplayer-subtitle-bo(41237)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41237"
            },
            {
              "name": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/vlcboffs-adv.txt"
            },
            {
              "name": "28251",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28251"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1881",
    "datePublished": "2008-04-17T23:00:00",
    "dateReserved": "2008-04-17T00:00:00",
    "dateUpdated": "2024-08-07T08:40:59.548Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-2147 (GCVE-0-2008-2147)
Vulnerability from cvelistv5
Published
2008-05-12 20:00
Modified
2024-08-07 08:49
Severity ?
CWE
  • n/a
Summary
Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:49:58.575Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "31317",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31317"
          },
          {
            "name": "vlc-searchpath-code-execution(42377)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.videolan.org/vlc/ticket/1578"
          },
          {
            "name": "GLSA-200807-13",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "31317",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31317"
        },
        {
          "name": "vlc-searchpath-code-execution(42377)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.videolan.org/vlc/ticket/1578"
        },
        {
          "name": "GLSA-200807-13",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2147",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "31317",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31317"
            },
            {
              "name": "vlc-searchpath-code-execution(42377)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42377"
            },
            {
              "name": "http://git.videolan.org/?p=vlc.git;a=commit;h=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181",
              "refsource": "CONFIRM",
              "url": "http://git.videolan.org/?p=vlc.git;a=commit;h=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181"
            },
            {
              "name": "http://trac.videolan.org/vlc/ticket/1578",
              "refsource": "CONFIRM",
              "url": "http://trac.videolan.org/vlc/ticket/1578"
            },
            {
              "name": "GLSA-200807-13",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200807-13.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2147",
    "datePublished": "2008-05-12T20:00:00",
    "dateReserved": "2008-05-12T00:00:00",
    "dateUpdated": "2024-08-07T08:49:58.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}