Security Bulletin VLC 3.0.11
source link: https://www.videolan.org/security/sb-vlc3011.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Summary : Multiple vulnerabilities fixed in VLC media player Date : June 2020 Affected versions : VLC media player 3.0.10 and earlier ID : VideoLAN-SB-VLC-3011 CVE references : CVE-2020-13428
Details
A remote user could create a specifically crafted file that could trigger a buffer overflow in VLC's H26X packetizer
Impact
If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.
While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.
We have not seen exploits performing code execution through these vulnerability
Threat mitigation
Exploitation of those issues requires the user to explicitly open a specially crafted file or stream.
Workarounds
The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.
Solution
VLC media player 3.0.11 addresses the issue.
Credits
CVE-2020-13428 was reported by Tommy Muir
Additional notes
VLC 3.0.11 also bumps some dependencies, notably libarchive, following the publication of CVE-2020-9308 and CVE-2019-19221
References
The VideoLAN project http://www.videolan.org/ VLC official GIT repository http://git.videolan.org/?p=vlc.gitRecommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK