Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 12 May 2008 15:58:05 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE id request: vlc local privilege escalation


======================================================
Name: CVE-2008-2147
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2147
Reference: CONFIRM:http://git.videolan.org/?p=vlc.git;a=commit;h=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181
Reference: CONFIRM:http://trac.videolan.org/vlc/ticket/1578

Untrusted search path vulnerability in VideoLAN VLC before 0.9.0
allows local users to execute arbitrary code via a malicious library
under the modules/ or plugins/ subdirectories of the current working
directory.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.