SB2015082509 - Buffer overflow in VideoLAN VLC Media Player
Published: August 25, 2015 Updated: August 3, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 vulnerability.
1) Buffer overflow (CVE-ID: CVE-2015-5949)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
VideoLAN VLC media player 2.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted 3GP file, which triggers the freeing of arbitrary pointers.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00040.html
- http://packetstormsecurity.com/files/133266/VLC-2.2.1-Arbitrary-Pointer-Dereference.html
- http://www.debian.org/security/2015/dsa-3342
- http://www.openwall.com/lists/oss-security/2015/08/20/3
- http://www.openwall.com/lists/oss-security/2015/08/20/8
- http://www.securityfocus.com/archive/1/536287/100/0/threaded
- https://git.videolan.org/?p=vlc/vlc-2.2.git;a=commitdiff;h=ce91452460a75d7424b165c4dc8db98114c3cbd9;hp=9e12195d3e4316278af1fa4bcb6a705ff27456fd
- https://security.gentoo.org/glsa/201603-08
- https://www.ocert.org/advisories/ocert-2015-009.html