The browser plugin in VideoLAN VLC 0.8.6d allows remote attackers to overwrite arbitrary files via (1) the :demuxdump-file option in a filename in a playlist, or (2) a EXTVLCOPT statement in an MP3 file, possibly an argument injection vulnerability.
References
Configurations
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://mailman.videolan.org/pipermail/vlc-devel/2007-December/037726.html - Exploit | |
References | () http://osvdb.org/42205 - | |
References | () http://osvdb.org/42206 - | |
References | () http://secunia.com/advisories/29284 - | |
References | () http://secunia.com/advisories/29766 - | |
References | () http://www.debian.org/security/2008/dsa-1543 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200803-13.xml - | |
References | () http://www.securityfocus.com/bid/28712 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14619 - | |
References | () https://trac.videolan.org/vlc/changeset/23197 - | |
References | () https://trac.videolan.org/vlc/ticket/1371 - |
Information
Published : 2008-01-17 01:00
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6683
Mitre link : CVE-2007-6683
CVE.ORG link : CVE-2007-6683
JSON object : View
Products Affected
videolan
- vlc
CWE