HTTP: VideoLAN VLC Media Player TY Processing Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the VideoLAN VLC Media Player. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server. In an unsuccessful attack, the VideoLAN VLC client application terminates unexpectedly.

Extended Description

VLC media player is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. VLC media player 0.9.0 up to and including 0.9.4 are vulnerable.

Affected Products

Videolan vlc_media_player

Short Name
HTTP:STC:DL:VLC-TY-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2008-4654 Media Overflow Player Processing TY VLC VideoLAN bid:31813
Release Date
10/15/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Videolan

CVSS Score

9.3

Found a potential security threat?