Executive Summary

Informations
Name CVE-2010-3275 First vendor Publication 2011-03-28
Vendor Cve Last vendor Modification 2018-10-10

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an AMV file, related to a "dangling pointer vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3275

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:14718
 
Oval ID: oval:org.mitre.oval:def:14718
Title: libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an AMV file, related to a "dangling pointer vulnerability."
Description: libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an AMV file, related to a "dangling pointer vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-3275
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Product(s): VLC Media Player
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 106

ExploitDB Exploits

id Description
2011-03-26 VLC AMV Dangling Pointer Vulnerability

OpenVAS Exploits

Date Description
2011-05-12 Name : Debian Security Advisory DSA 2211-1 (vlc)
File : nvt/deb_2211_1.nasl
2011-04-01 Name : VLC Media Player AMV and NSV Data Processing Memory Corruption vulnerability ...
File : nvt/secpod_vlc_media_player_mem_crptn_vuln_win.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
71277 VLC Media Player libdirectx_plugin.dll AMV File Large Video Dimension Overflow

VLC Media Player is prone to an overflow condition. libdirectx_plugin.dll fails to properly sanitize user-supplied input resulting in a buffer overflow. With a specially crafted width in an AMV file, a context-dependent attacker can potentially execute arbitrary code.

Snort® IPS/IDS

Date Description
2014-01-10 VideoLAN VLC Media Player libdirectx_plugin.dll AMV parsing buffer overflow a...
RuleID : 19883 - Revision : 7 - Type : FILE-MULTIMEDIA

Metasploit Database

id Description
2011-03-23 VLC AMV Dangling Pointer Vulnerability

Nessus® Vulnerability Scanner

Date Description
2014-11-06 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201411-01.nasl - Type : ACT_GATHER_INFO
2011-04-07 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2211.nasl - Type : ACT_GATHER_INFO
2011-03-25 Name : The remote Windows host contains a media player that is affected by multiple ...
File : vlc_1_1_8.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/47012
BUGTRAQ http://www.securityfocus.com/archive/1/517150/100/0/threaded
CONFIRM http://www.videolan.org/vlc/releases/1.1.8.html
DEBIAN http://www.debian.org/security/2011/dsa-2211
EXPLOIT-DB http://www.exploit-db.com/exploits/17048
MISC http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files
http://www.metasploit.com/modules/exploit/windows/browser/vlc_amv
OSVDB http://www.osvdb.org/71277
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SECTRACK http://securitytracker.com/id?1025250
SECUNIA http://secunia.com/advisories/43826
SREASON http://securityreason.com/securityalert/8162
VUPEN http://www.vupen.com/english/advisories/2011/0759
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/66259

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Date Informations
2023-03-03 12:11:00
  • Multiple Updates
2021-05-04 12:12:18
  • Multiple Updates
2021-04-22 01:13:04
  • Multiple Updates
2020-05-23 13:16:55
  • Multiple Updates
2020-05-23 01:42:37
  • Multiple Updates
2020-05-23 00:26:25
  • Multiple Updates
2019-07-27 12:03:10
  • Multiple Updates
2018-10-11 00:19:55
  • Multiple Updates
2017-09-19 09:23:56
  • Multiple Updates
2017-08-17 09:23:06
  • Multiple Updates
2017-07-01 12:01:33
  • Multiple Updates
2016-06-28 18:18:24
  • Multiple Updates
2016-04-26 20:04:22
  • Multiple Updates
2014-11-07 13:26:09
  • Multiple Updates
2014-02-17 10:57:15
  • Multiple Updates
2014-01-19 21:27:08
  • Multiple Updates
2013-05-10 23:32:01
  • Multiple Updates