SB2019080706 - Multiple vulnerabilities in VLC Media Player



SB2019080706 - Multiple vulnerabilities in VLC Media Player

Published: August 7, 2019 Updated: August 8, 2019

Security Bulletin ID SB2019080706
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Double Free (CVE-ID: CVE-2019-5460)

The vulnerability allows a remote attacker to perform denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing media files in the modules/codec/faad.c file. A remote attacker can trick the victim to open a specially crafted media file, trigger double free error and crash the application.

2) Integer underflow (CVE-ID: CVE-2019-5459)

The vulnerability allows a remote attacker to perform denial of service (DoS) attack.

The vulnerability exists due to integer underflow when processing FAAD2 media files. A remote attacker can create a specially crafted media file, trick the victim to open it, trigger integer underflow and crash the affected application.


3) Buffer overflow (CVE-ID: CVE-2019-5439)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing media files in libavi_plugin. A remote attacker can create a specially crafted Office document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Double Free (CVE-ID: CVE-2019-12874)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing MKV files in zlib_decompress_extra() function in modules/demux/mkv/util.cpp. A remote attacker can create a specially crafted MKV file, trick the victim into opening it, trigger double free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.