CVE-2008-5036

Stack-based buffer overflow in VideoLAN VLC media player 0.9.x before 0.9.6 might allow user-assisted attackers to execute arbitrary code via an an invalid RealText (rt) subtitle file, related to the ParseRealText function in modules/demux/subtitle.c. NOTE: this issue was SPLIT from CVE-2008-5032 on 20081110.
References
Link Resource
http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447
http://secunia.com/advisories/32569
http://secunia.com/advisories/33315
http://security.gentoo.org/glsa/glsa-200812-24.xml
http://www.openwall.com/lists/oss-security/2008/11/05/4
http://www.openwall.com/lists/oss-security/2008/11/05/5
http://www.openwall.com/lists/oss-security/2008/11/10/13
http://www.securityfocus.com/archive/1/498111/100/0/threaded
http://www.securityfocus.com/bid/32125
http://www.trapkit.de/advisories/TKADV2008-011.txt Exploit
http://www.videolan.org/security/sa0810.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/46376
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14329
https://www.exploit-db.com/exploits/7051
http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447
http://secunia.com/advisories/32569
http://secunia.com/advisories/33315
http://security.gentoo.org/glsa/glsa-200812-24.xml
http://www.openwall.com/lists/oss-security/2008/11/05/4
http://www.openwall.com/lists/oss-security/2008/11/05/5
http://www.openwall.com/lists/oss-security/2008/11/10/13
http://www.securityfocus.com/archive/1/498111/100/0/threaded
http://www.securityfocus.com/bid/32125
http://www.trapkit.de/advisories/TKADV2008-011.txt Exploit
http://www.videolan.org/security/sa0810.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/46376
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14329
https://www.exploit-db.com/exploits/7051
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:videolan:vlc_media_player:0.9:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447 - () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447 -
References () http://secunia.com/advisories/32569 - () http://secunia.com/advisories/32569 -
References () http://secunia.com/advisories/33315 - () http://secunia.com/advisories/33315 -
References () http://security.gentoo.org/glsa/glsa-200812-24.xml - () http://security.gentoo.org/glsa/glsa-200812-24.xml -
References () http://www.openwall.com/lists/oss-security/2008/11/05/4 - () http://www.openwall.com/lists/oss-security/2008/11/05/4 -
References () http://www.openwall.com/lists/oss-security/2008/11/05/5 - () http://www.openwall.com/lists/oss-security/2008/11/05/5 -
References () http://www.openwall.com/lists/oss-security/2008/11/10/13 - () http://www.openwall.com/lists/oss-security/2008/11/10/13 -
References () http://www.securityfocus.com/archive/1/498111/100/0/threaded - () http://www.securityfocus.com/archive/1/498111/100/0/threaded -
References () http://www.securityfocus.com/bid/32125 - () http://www.securityfocus.com/bid/32125 -
References () http://www.trapkit.de/advisories/TKADV2008-011.txt - Exploit () http://www.trapkit.de/advisories/TKADV2008-011.txt - Exploit
References () http://www.videolan.org/security/sa0810.html - () http://www.videolan.org/security/sa0810.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46376 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46376 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14329 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14329 -
References () https://www.exploit-db.com/exploits/7051 - () https://www.exploit-db.com/exploits/7051 -

07 Nov 2023, 02:03

Type Values Removed Values Added
References
  • {'url': 'http://git.videolan.org/?p=vlc.git;a=commitdiff;h=e3cef651125701a2e33a8d75b815b3e39681a447', 'name': 'http://git.videolan.org/?p=vlc.git;a=commitdiff;h=e3cef651125701a2e33a8d75b815b3e39681a447', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447 -

Information

Published : 2008-11-10 22:18

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5036

Mitre link : CVE-2008-5036

CVE.ORG link : CVE-2008-5036


JSON object : View

Products Affected

videolan

  • vlc_media_player
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer