CVE-2008-5032

Stack-based buffer overflow in VideoLAN VLC media player 0.5.0 through 0.9.5 might allow user-assisted attackers to execute arbitrary code via the header of an invalid CUE image file, related to modules/access/vcd/cdrom.c. NOTE: this identifier originally included an issue related to RealText, but that issue has been assigned a separate identifier, CVE-2008-5036.
References
Link Resource
http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=5f63f1562d43f32331006c2c1a61742de031b84d
http://secunia.com/advisories/32569 Vendor Advisory
http://secunia.com/advisories/33315 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200812-24.xml
http://www.openwall.com/lists/oss-security/2008/11/05/4
http://www.openwall.com/lists/oss-security/2008/11/05/5
http://www.openwall.com/lists/oss-security/2008/11/10/13
http://www.securityfocus.com/archive/1/498112/100/0/threaded
http://www.securityfocus.com/bid/32125
http://www.trapkit.de/advisories/TKADV2008-012.txt Exploit
http://www.videolan.org/security/sa0810.html Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46375
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14798
http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=5f63f1562d43f32331006c2c1a61742de031b84d
http://secunia.com/advisories/32569 Vendor Advisory
http://secunia.com/advisories/33315 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200812-24.xml
http://www.openwall.com/lists/oss-security/2008/11/05/4
http://www.openwall.com/lists/oss-security/2008/11/05/5
http://www.openwall.com/lists/oss-security/2008/11/10/13
http://www.securityfocus.com/archive/1/498112/100/0/threaded
http://www.securityfocus.com/bid/32125
http://www.trapkit.de/advisories/TKADV2008-012.txt Exploit
http://www.videolan.org/security/sa0810.html Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46375
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14798
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.7.1a:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.7.2:test2:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.7.2:test3:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.4:test2:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.4a:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.5:test3:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.5:test4:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6a:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6b:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6c:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6d:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6e:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6f:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6g:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6h:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6i:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=5f63f1562d43f32331006c2c1a61742de031b84d - () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=5f63f1562d43f32331006c2c1a61742de031b84d -
References () http://secunia.com/advisories/32569 - Vendor Advisory () http://secunia.com/advisories/32569 - Vendor Advisory
References () http://secunia.com/advisories/33315 - Vendor Advisory () http://secunia.com/advisories/33315 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200812-24.xml - () http://security.gentoo.org/glsa/glsa-200812-24.xml -
References () http://www.openwall.com/lists/oss-security/2008/11/05/4 - () http://www.openwall.com/lists/oss-security/2008/11/05/4 -
References () http://www.openwall.com/lists/oss-security/2008/11/05/5 - () http://www.openwall.com/lists/oss-security/2008/11/05/5 -
References () http://www.openwall.com/lists/oss-security/2008/11/10/13 - () http://www.openwall.com/lists/oss-security/2008/11/10/13 -
References () http://www.securityfocus.com/archive/1/498112/100/0/threaded - () http://www.securityfocus.com/archive/1/498112/100/0/threaded -
References () http://www.securityfocus.com/bid/32125 - () http://www.securityfocus.com/bid/32125 -
References () http://www.trapkit.de/advisories/TKADV2008-012.txt - Exploit () http://www.trapkit.de/advisories/TKADV2008-012.txt - Exploit
References () http://www.videolan.org/security/sa0810.html - Vendor Advisory () http://www.videolan.org/security/sa0810.html - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46375 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46375 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14798 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14798 -

07 Nov 2023, 02:03

Type Values Removed Values Added
References
  • {'url': 'http://git.videolan.org/?p=vlc.git;a=commitdiff;h=5f63f1562d43f32331006c2c1a61742de031b84d', 'name': 'http://git.videolan.org/?p=vlc.git;a=commitdiff;h=5f63f1562d43f32331006c2c1a61742de031b84d', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=5f63f1562d43f32331006c2c1a61742de031b84d -

Information

Published : 2008-11-10 16:15

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5032

Mitre link : CVE-2008-5032

CVE.ORG link : CVE-2008-5032


JSON object : View

Products Affected

videolan

  • vlc_media_player
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer