Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 11 Aug 2010 22:54:04 +0300
From: "Rémi Denis-Courmont" <rem@...eolan.org>
To: oss-security@...ts.openwall.com,
 remi@...lab.net
Subject: CVE request: VideoLAN advisory 1004

	Hello,

Can I get a CVE number for this? Please CC me on replies.

http://www.videolan.org/security/sa1004.html

----8<--------8<--------8<--------8<--------8<--------8<--------8<----

VideoLAN Security Advisory 1004

Summary           : Insufficient input validation in VLC TagLib plugin
Date              : August 2011
Affected versions : VLC media player versions 1.1.2 down to 0.9.0
ID                : VideoLAN-SA-1004
CVE reference     : N/A

Details

VLC fails to perform sufficient input validation when trying to extract some 
meta-informations about input media through ID3v2 tags. In the failure case, 
VLC attempt dereference an invalid memory address, and a crash will ensure.

Impact

In the failure case, VLC will dereference a memory address within the first 
page of its process virtual memory. In normal conditions, and on most 
operating systems, this will result in a segmentation fault (a general 
protection fault on Windows), and the process will terminate abruptly.

In most usage scenarii, this will only cause user annoyance.

Threat mitigation

Exploitation of this issue requires the user to include a file in its playlist 
or to attempt to open it.

Workarounds

The user should refrain from opening files from untrusted third parties or 
accessing untrusted remote sites (or disable the VLC browser plugins), until 
the patch is applied.

Solution

VLC media player 1.1.3 [will address] this issue. Patches for VLC media player 
1.1.x and 1.0.x are available from the corresponding official VLC source code 
repositories.

Credits

This vulnerability was reported by FortiGuard Labs.

References

The VideoLAN project
    http://www.videolan.org/ 
FortiGuard Labs
    http://www.fortinet.com/ 
Patch for VLC 1.1.2, 1.1.1, 1.1.0
    commit 24918843e57c7962e28fcb01845adce82bed6516 
Patch for VLC 1.0.6
    commit 22a22e356c9d93993086810b2e25b59b55925b3a 

----8<--------8<--------8<--------8<--------8<--------8<--------8<----

Thanks in advance, best regards,

-- 
Rémi Denis-Courmont
http://git.remlab.net/cgi-bin/gitweb.cgi?p=vlc-courmisch.git;a=summary

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.