Security Bulletin VLC 3.0.11

栏目: IT技术 · 发布时间: 3年前

内容简介:A remote user could create a specifically crafted file that could trigger a buffer overflow in VLC's H26X packetizerIf successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target
Summary           : Multiple vulnerabilities fixed in VLC media player
Date              : June 2020
Affected versions : VLC media player 3.0.10 and earlier
ID                : VideoLAN-SB-VLC-3011
CVE references    : CVE-2020-13428

Details

A remote user could create a specifically crafted file that could trigger a buffer overflow in VLC's H26X packetizer

Impact

If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.

We have not seen exploits performing code execution through these vulnerability

Threat mitigation

Exploitation of those issues requires the user to explicitly open a specially crafted file or stream.

Workarounds

The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.

Solution

VLC media player 3.0.11 addresses the issue.

Credits

CVE-2020-13428 was reported by Tommy Muir

Additional notes

VLC 3.0.11 also bumps some dependencies, notably libarchive, following the publication of CVE-2020-9308 and CVE-2019-19221

References

The VideoLAN project
http://www.videolan.org/
VLC official GIT repository
http://git.videolan.org/?p=vlc.git

以上所述就是小编给大家介绍的《Security Bulletin VLC 3.0.11》,希望对大家有所帮助,如果大家有任何疑问请给我留言,小编会及时回复大家的。在此也非常感谢大家对 码农网 的支持!

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

计算几何

计算几何

邓俊辉 / 清华大学出版社 / 2009-6 / 49.00元

《计算几何:算法与应用(第3版)》的前4章对几何算法进行了讨论,包括几何求交、三角剖分、线性规划等,其中涉及的随机算法也是《计算几何:算法与应用(第3版)》的一个鲜明特点。第5章至第10章介绍了多种几何结构,包括几何查找、kd树、区域树、梯形图、Voronoi图、排列、Delaunay三角剖分、区间树、优先查找树以及线段树等。第11章至第16章结合实际问题,继续讨论了若干几何算法及其数据结构,包括......一起来看看 《计算几何》 这本书的介绍吧!

Base64 编码/解码
Base64 编码/解码

Base64 编码/解码

URL 编码/解码
URL 编码/解码

URL 编码/解码

SHA 加密
SHA 加密

SHA 加密工具