CVE-2008-4654

Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player 0.9.0 through 0.9.4 allows remote attackers to execute arbitrary code via a TiVo TY media file with a header containing a crafted size value.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033
http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7eaa39c462d65e9133
http://secunia.com/advisories/32339 Vendor Advisory
http://securityreason.com/securityalert/4460
http://www.openwall.com/lists/oss-security/2008/10/19/2
http://www.securityfocus.com/archive/1/497587/100/0/threaded
http://www.securityfocus.com/bid/31813
http://www.trapkit.de/advisories/TKADV2008-010.txt Exploit
http://www.videolan.org/security/sa0809.html Vendor Advisory
http://www.vupen.com/english/advisories/2008/2856
https://exchange.xforce.ibmcloud.com/vulnerabilities/45960
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14803
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726
http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033
http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7eaa39c462d65e9133
http://secunia.com/advisories/32339 Vendor Advisory
http://securityreason.com/securityalert/4460
http://www.openwall.com/lists/oss-security/2008/10/19/2
http://www.securityfocus.com/archive/1/497587/100/0/threaded
http://www.securityfocus.com/bid/31813
http://www.trapkit.de/advisories/TKADV2008-010.txt Exploit
http://www.videolan.org/security/sa0809.html Vendor Advisory
http://www.vupen.com/english/advisories/2008/2856
https://exchange.xforce.ibmcloud.com/vulnerabilities/45960
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14803
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:52

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726 -
References () http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033 - () http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033 -
References () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7eaa39c462d65e9133 - () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7eaa39c462d65e9133 -
References () http://secunia.com/advisories/32339 - Vendor Advisory () http://secunia.com/advisories/32339 - Vendor Advisory
References () http://securityreason.com/securityalert/4460 - () http://securityreason.com/securityalert/4460 -
References () http://www.openwall.com/lists/oss-security/2008/10/19/2 - () http://www.openwall.com/lists/oss-security/2008/10/19/2 -
References () http://www.securityfocus.com/archive/1/497587/100/0/threaded - () http://www.securityfocus.com/archive/1/497587/100/0/threaded -
References () http://www.securityfocus.com/bid/31813 - () http://www.securityfocus.com/bid/31813 -
References () http://www.trapkit.de/advisories/TKADV2008-010.txt - Exploit () http://www.trapkit.de/advisories/TKADV2008-010.txt - Exploit
References () http://www.videolan.org/security/sa0809.html - Vendor Advisory () http://www.videolan.org/security/sa0809.html - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/2856 - () http://www.vupen.com/english/advisories/2008/2856 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45960 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/45960 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14803 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14803 -

07 Nov 2023, 02:02

Type Values Removed Values Added
References
  • {'url': 'http://git.videolan.org/?p=vlc.git;a=commitdiff;h=26d92b87bba99b5ea2e17b7eaa39c462d65e9133', 'name': 'http://git.videolan.org/?p=vlc.git;a=commitdiff;h=26d92b87bba99b5ea2e17b7eaa39c462d65e9133', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://git.videolan.org/?p=vlc.git;a=commit;h=fde9e1cc1fe1ec9635169fa071e42b3aa6436033', 'name': 'http://git.videolan.org/?p=vlc.git;a=commit;h=fde9e1cc1fe1ec9635169fa071e42b3aa6436033', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7eaa39c462d65e9133 -
  • () http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033 -

Information

Published : 2008-10-22 00:11

Updated : 2024-11-21 00:52


NVD link : CVE-2008-4654

Mitre link : CVE-2008-4654

CVE.ORG link : CVE-2008-4654


JSON object : View

Products Affected

videolan

  • vlc_media_player
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer