Executive Summary

Summary
Title vlc security update
Informations
Name DSA-2159 First vendor Publication 2011-02-10
Vendor Debian Last vendor Modification 2011-02-10
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Dan Rosenberg discovered that insufficient input validation in VLC's processing of Matroska/WebM containers could lead to the execution of arbitrary code.

For the stable distribution (squeeze), this problem has been fixed in version 1.1.3-1squeeze3.

The version of vlc in the oldstable distribution (lenny) is affected by further issues and will be addressed in a followup DSA.

For the unstable distribution (sid), this problem has been fixed in version 1.1.7-1.

We recommend that you upgrade your vlc packages.

Original Source

Url : http://www.debian.org/security/2011/dsa-2159

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11992
 
Oval ID: oval:org.mitre.oval:def:11992
Title: DSA-2211-1 vlc -- missing input sanitising
Description: Ricardo Narvaja discovered that missing input sanitising in VLC, a multimedia player and streamer, could lead to the execution of arbitrary code if a user is tricked into opening a malformed media file. This update also provides updated packages for oldstable for vulnerabilities, which have already been addressed in Debian stable , either during the freeze or in DSA-2159
Family: unix Class: patch
Reference(s): DSA-2211-1
CVE-2010-3275
CVE-2010-3276
CVE-2010-0522
CVE-2010-1441
CVE-2010-1442
CVE-2011-0531
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): vlc
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12415
 
Oval ID: oval:org.mitre.oval:def:12415
Title: Denial of service vulnerability in the MKV demuxer plugin in VideoLAN VLC media player in VideoLAN VLC Media Player before 1.1.7
Description: demux/mkv/mkv.hpp in the MKV demuxer plugin in VideoLAN VLC media player 1.1.6.1 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary commands via a crafted MKV (WebM or Matroska) file that triggers memory corruption, related to "class mismatching" and the MKV_IS_ID macro.
Family: windows Class: vulnerability
Reference(s): CVE-2011-0531
Version: 9
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows XP
Product(s): VLC Media Player
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12718
 
Oval ID: oval:org.mitre.oval:def:12718
Title: DSA-2159-1 vlc -- missing input sanitising
Description: Dan Rosenberg discovered that insufficient input validation in VLC's processing of Matroska/WebM containers could lead to the execution of arbitrary code.
Family: unix Class: patch
Reference(s): DSA-2159-1
CVE-2011-0531
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): vlc
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 105

SAINT Exploits

Description Link
VideoLAN VLC Media Player MKV Demuxer Code Execution More info here

OpenVAS Exploits

Date Description
2011-05-12 Name : Debian Security Advisory DSA 2211-1 (vlc)
File : nvt/deb_2211_1.nasl
2011-03-07 Name : Debian Security Advisory DSA 2159-1 (vlc)
File : nvt/deb_2159_1.nasl
2011-03-05 Name : FreeBSD Ports: vlc
File : nvt/freebsd_vlc4.nasl
2011-02-23 Name : VLC Media Player '.mkv' Code Execution Vulnerability (Linux)
File : nvt/secpod_vlc_media_player_code_exec_vuln_lin.nasl
2011-02-23 Name : VLC Media Player '.mkv' Code Execution Vulnerability (Windows)
File : nvt/secpod_vlc_media_player_code_exec_vuln_win.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70698 VLC Media Player MKV Demuxer modules/demux/mkv/mkv.hpp MKV_IS_ID Macro Arbitr...

VLC Media Player contains an input validation error within the 'MKV_IS_ID' macro in 'modules/demux/mkv/mkv.hpp' of the MKV demuxer. This may be exploited by a context-dependent attacker with a crafted MKV file to execute arbitrary code.

Snort® IPS/IDS

Date Description
2014-01-10 VideoLAN VLC webm memory corruption attempt
RuleID : 24283 - Revision : 5 - Type : FILE-MULTIMEDIA
2014-01-10 VideoLAN VLC webm memory corruption attempt
RuleID : 20227 - Revision : 12 - Type : FILE-MULTIMEDIA

Nessus® Vulnerability Scanner

Date Description
2014-11-06 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201411-01.nasl - Type : ACT_GATHER_INFO
2011-04-07 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2211.nasl - Type : ACT_GATHER_INFO
2011-02-11 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2159.nasl - Type : ACT_GATHER_INFO
2011-02-02 Name : The remote Windows host contains an media player that is affected by a code e...
File : vlc_1_1_7.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:29:51
  • Multiple Updates