HTTP: VideoLAN VLC ActiveX Control Exploit

This signature detects attempts to exploit a known vulnerability in VideoLAN VLC ActiveX Control. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

VideoLAN VLC media player is prone to multiple memory-corruption vulnerabilities. Successfully exploiting these issues allow remote attackers to execute arbitrary code in the context of the application using the affectecd ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. These issues affect VLC media player 0.8.6 to 0.8.6c.

Affected Products

Videolan vlc_media_player

Short Name
HTTP:STC:ACTIVEX:AXVLC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
ActiveX CVE-2007-6262 Control Exploit VLC VideoLAN bid:26675 bid:36439
Release Date
03/07/2008
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3695
False Positive
Unknown
Vendors

Videolan

CVSS Score

6.8

Found a potential security threat?