CVE-2010-3275

libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote attackers to execute arbitrary code via a crafted width in an AMV file, related to a "dangling pointer vulnerability."
References
Link Resource
http://secunia.com/advisories/43826 Vendor Advisory
http://securityreason.com/securityalert/8162
http://securitytracker.com/id?1025250
http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files
http://www.debian.org/security/2011/dsa-2211
http://www.exploit-db.com/exploits/17048 Exploit
http://www.metasploit.com/modules/exploit/windows/browser/vlc_amv Exploit
http://www.osvdb.org/71277
http://www.securityfocus.com/archive/1/517150/100/0/threaded
http://www.securityfocus.com/bid/47012 Exploit
http://www.videolan.org/vlc/releases/1.1.8.html Patch
http://www.vupen.com/english/advisories/2011/0759 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/66259
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14718
http://secunia.com/advisories/43826 Vendor Advisory
http://securityreason.com/securityalert/8162
http://securitytracker.com/id?1025250
http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files
http://www.debian.org/security/2011/dsa-2211
http://www.exploit-db.com/exploits/17048 Exploit
http://www.metasploit.com/modules/exploit/windows/browser/vlc_amv Exploit
http://www.osvdb.org/71277
http://www.securityfocus.com/archive/1/517150/100/0/threaded
http://www.securityfocus.com/bid/47012 Exploit
http://www.videolan.org/vlc/releases/1.1.8.html Patch
http://www.vupen.com/english/advisories/2011/0759 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/66259
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14718
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:videolan:vlc_media_player:*:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.1.99b:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.1.99e:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.1.99f:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.1.99g:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.1.99h:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.1.99i:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.60:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.61:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.62:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.63:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.70:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.71:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.72:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.73:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.80:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.81:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.82:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.83:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.90:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.91:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.2.92:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.8a:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.9:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:0.9.10:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:videolan:vlc_media_player:1.1.6.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:18

Type Values Removed Values Added
References () http://secunia.com/advisories/43826 - Vendor Advisory () http://secunia.com/advisories/43826 - Vendor Advisory
References () http://securityreason.com/securityalert/8162 - () http://securityreason.com/securityalert/8162 -
References () http://securitytracker.com/id?1025250 - () http://securitytracker.com/id?1025250 -
References () http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files - () http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files -
References () http://www.debian.org/security/2011/dsa-2211 - () http://www.debian.org/security/2011/dsa-2211 -
References () http://www.exploit-db.com/exploits/17048 - Exploit () http://www.exploit-db.com/exploits/17048 - Exploit
References () http://www.metasploit.com/modules/exploit/windows/browser/vlc_amv - Exploit () http://www.metasploit.com/modules/exploit/windows/browser/vlc_amv - Exploit
References () http://www.osvdb.org/71277 - () http://www.osvdb.org/71277 -
References () http://www.securityfocus.com/archive/1/517150/100/0/threaded - () http://www.securityfocus.com/archive/1/517150/100/0/threaded -
References () http://www.securityfocus.com/bid/47012 - Exploit () http://www.securityfocus.com/bid/47012 - Exploit
References () http://www.videolan.org/vlc/releases/1.1.8.html - Patch () http://www.videolan.org/vlc/releases/1.1.8.html - Patch
References () http://www.vupen.com/english/advisories/2011/0759 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0759 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/66259 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/66259 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14718 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14718 -

Information

Published : 2011-03-28 16:55

Updated : 2024-11-21 01:18


NVD link : CVE-2010-3275

Mitre link : CVE-2010-3275

CVE.ORG link : CVE-2010-3275


JSON object : View

Products Affected

videolan

  • vlc_media_player
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer