CVE-2008-5276

Integer overflow in the ReadRealIndex function in real.c in the Real demuxer plugin in VideoLAN VLC media player 0.9.0 through 0.9.7 allows remote attackers to execute arbitrary code via a malformed RealMedia (.rm) file that triggers a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:videolan:vlc_media_player:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d19de4e9f2211cbe5bde00726b66c47a424f4e07 - () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d19de4e9f2211cbe5bde00726b66c47a424f4e07 -
References () http://secunia.com/advisories/32942 - Vendor Advisory () http://secunia.com/advisories/32942 - Vendor Advisory
References () http://secunia.com/advisories/33315 - () http://secunia.com/advisories/33315 -
References () http://security.gentoo.org/glsa/glsa-200812-24.xml - () http://security.gentoo.org/glsa/glsa-200812-24.xml -
References () http://securityreason.com/securityalert/4680 - () http://securityreason.com/securityalert/4680 -
References () http://www.osvdb.org/50333 - () http://www.osvdb.org/50333 -
References () http://www.securityfocus.com/archive/1/498768/100/0/threaded - () http://www.securityfocus.com/archive/1/498768/100/0/threaded -
References () http://www.securityfocus.com/bid/32545 - () http://www.securityfocus.com/bid/32545 -
References () http://www.trapkit.de/advisories/TKADV2008-013.txt - Exploit () http://www.trapkit.de/advisories/TKADV2008-013.txt - Exploit
References () http://www.videolan.org/security/sa0811.html - Vendor Advisory () http://www.videolan.org/security/sa0811.html - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/3287 - () http://www.vupen.com/english/advisories/2008/3287 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14793 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14793 -

07 Nov 2023, 02:03

Type Values Removed Values Added
References
  • {'url': 'http://git.videolan.org/?p=vlc.git;a=commitdiff;h=d19de4e9f2211cbe5bde00726b66c47a424f4e07', 'name': 'http://git.videolan.org/?p=vlc.git;a=commitdiff;h=d19de4e9f2211cbe5bde00726b66c47a424f4e07', 'tags': ['Exploit'], 'refsource': 'CONFIRM'}
  • () http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d19de4e9f2211cbe5bde00726b66c47a424f4e07 -

Information

Published : 2008-12-03 17:30

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5276

Mitre link : CVE-2008-5276

CVE.ORG link : CVE-2008-5276


JSON object : View

Products Affected

videolan

  • vlc_media_player
CWE
CWE-189

Numeric Errors