Out-of-bounds read in VLC Media Player - CVE-2019-14776
Published: August 29, 2019 / Updated: August 3, 2020
VLC Media Player
Detailed vulnerability description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in DemuxInit() in demux/asf/asf.c in VideoLAN VLC media player 3.0.7.1 via a crafted .mkv file. A remote attacker can pass specially crafted data to the application, trigger out-of-bounds read error and read contents of memory on the system.
How to mitigate CVE-2019-14776
Sources
- http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
- https://seclists.org/bugtraq/2019/Aug/36
- https://security.gentoo.org/glsa/201909-02
- https://usn.ubuntu.com/4131-1/
- https://www.debian.org/security/2019/dsa-4504
- https://www.videolan.org/security/sb-vlc308.html