Heap out-of-bound read in ParseJSS in VideoLAN VLC due to missing check of string length allows attackers to read heap uninitialized data via a crafted subtitles file.
References
Configurations
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.videolan.org/?p=vlc.git%3Ba=blobdiff%3Bf=modules/demux/subtitle.c%3Bh=5e4fcdb7f25b2819f5441156c7c0ea2a7d112ca3%3Bhp=2a75fbfb7c3f56b24b2e4498bbb8fe0aa2575974%3Bhb=611398fc8d32f3fe4331f60b220c52ba3557beaa%3Bhpb=075bc7169b05b004fa0250e4a4ce5516b05487a9 - | |
References | () http://www.debian.org/security/2017/dsa-3899 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/98631 - Third Party Advisory, VDB Entry | |
References | () https://security.gentoo.org/glsa/201707-10 - Third Party Advisory |
07 Nov 2023, 02:50
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-05-23 21:29
Updated : 2024-11-21 03:33
NVD link : CVE-2017-8312
Mitre link : CVE-2017-8312
CVE.ORG link : CVE-2017-8312
JSON object : View
Products Affected
debian
- debian_linux
videolan
- vlc_media_player
CWE
CWE-125
Out-of-bounds Read