VLC Media Player 2.x < 2.2.1 Multiple Vulnerabilities

critical Nessus Network Monitor Plugin ID 9798

Synopsis

The remote host contains a media application that is affected by multiple attack vectors.

Description

The remote host is running VLC 2.x prior to 2.2.1 and is affected by multiple vulnerabilities :

- A flaw exists that is triggered as user-supplied input is not properly validated when handling a specially crafted MP4 file. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code.
- An overflow condition exists that is triggered as user-supplied input is not properly validated when handling a WAV file. This may allow a context-dependent attacker to cause a heap-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.

Solution

Upgrade to VLC Media Player 2.x version 2.2.1 or later.

See Also

http://www.videolan.org/vlc/releases/2.2.1.html

Plugin Details

Severity: Critical

ID: 9798

Family: Web Clients

Published: 11/18/2016

Updated: 3/6/2019

Nessus ID: 91773

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 9.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:videolan:vlc_media_player

Patch Publication Date: 2/27/2015

Vulnerability Publication Date: 9/28/2016

Reference Information

CVE: CVE-2016-3941

BID: 85752