HTTP: VideoLAN VLC ActiveX Control Exploit
This signature detects attempts to exploit a known vulnerability in VideoLAN VLC ActiveX Control. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.
Extended Description
VideoLAN VLC media player is prone to multiple memory-corruption vulnerabilities. Successfully exploiting these issues allow remote attackers to execute arbitrary code in the context of the application using the affectecd ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. These issues affect VLC media player 0.8.6 to 0.8.6c.
Affected Products
Videolan vlc_media_player
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Videolan
6.8