Integer underflow in the real_get_rdt_chunk function in real.c, as used in modules/access/rtsp/real.c in VideoLAN VLC media player before 1.0.1 and stream/realrtsp/real.c in MPlayer before r29447, allows remote attackers to execute arbitrary code via a crafted length value in an RDT chunk header.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=dc74600c97eb834c08674676e209afa842053aca - | |
References | () http://openwall.com/lists/oss-security/2010/06/04/4 - | |
References | () http://seclists.org/fulldisclosure/2009/Jul/418 - Exploit | |
References | () https://dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/ - Exploit |
07 Nov 2023, 02:05
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2014-12-26 20:59
Updated : 2024-11-21 01:15
NVD link : CVE-2010-2062
Mitre link : CVE-2010-2062
CVE.ORG link : CVE-2010-2062
JSON object : View
Products Affected
videolan
- vlc_media_player
CWE
CWE-189
Numeric Errors