SB2019080706 - Multiple vulnerabilities in VLC Media Player
Published: August 7, 2019 Updated: August 8, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Double Free (CVE-ID: CVE-2019-5460)
The vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing media files in the modules/codec/faad.c file. A remote attacker can trick the victim to open a specially crafted media file, trigger double free error and crash the application.2) Integer underflow (CVE-ID: CVE-2019-5459)
The vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to integer underflow when processing FAAD2 media files. A remote attacker can create a specially crafted media file, trick the victim to open it, trigger integer underflow and crash the affected application.
3) Buffer overflow (CVE-ID: CVE-2019-5439)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing media files in libavi_plugin. A remote attacker can create a specially crafted Office document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Double Free (CVE-ID: CVE-2019-12874)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing MKV files in zlib_decompress_extra() function in modules/demux/mkv/util.cpp. A remote attacker can create a specially crafted MKV file, trick the victim into opening it, trigger double free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://hackerone.com/reports/503208
- https://github.com/videolan/vlc/commit/f256bf045c2b1f7395f61b2039a67f18aee66673
- https://hackerone.com/reports/502816
- https://hackerone.com/reports/507858
- https://github.com/videolan/vlc/commit/16d40d9f8a57b6bdd01b8ee0ecf5147547d5953c
- https://hackerone.com/reports/484398
- http://git.videolan.org/?p=vlc.git;a=commit;h=81023659c7de5ac2637b4a879195efef50846102