CVE-2018-19857

The CAF demuxer in modules/demux/caf.c in VideoLAN VLC media player 3.0.4 may read memory from an uninitialized pointer when processing magic cookies in CAF files, because a ReadKukiChunk() cast converts a return value to an unsigned int even if that value is negative. This could result in a denial of service and/or a potential infoleak.
Configurations

Configuration 1 (hide)

cpe:2.3:a:videolan:vlc_media_player:3.0.4:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:58

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html -
References () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html - () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html -
References () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html - () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html -
References () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html - () http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html -
References () http://www.securityfocus.com/bid/106130 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106130 - Third Party Advisory, VDB Entry
References () https://dyntopia.com/advisories/013-vlc - Exploit, Third Party Advisory () https://dyntopia.com/advisories/013-vlc - Exploit, Third Party Advisory
References () https://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=0cc5ea748ee5ff7705dde61ab15dff8f58be39d0 - () https://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=0cc5ea748ee5ff7705dde61ab15dff8f58be39d0 -
References () https://usn.ubuntu.com/4074-1/ - () https://usn.ubuntu.com/4074-1/ -
References () https://www.debian.org/security/2019/dsa-4366 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4366 - Third Party Advisory

07 Nov 2023, 02:55

Type Values Removed Values Added
References
  • {'url': 'https://git.videolan.org/?p=vlc.git;a=commit;h=0cc5ea748ee5ff7705dde61ab15dff8f58be39d0', 'name': 'https://git.videolan.org/?p=vlc.git;a=commit;h=0cc5ea748ee5ff7705dde61ab15dff8f58be39d0', 'tags': ['Patch', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=0cc5ea748ee5ff7705dde61ab15dff8f58be39d0 -

Information

Published : 2018-12-05 11:29

Updated : 2024-11-21 03:58


NVD link : CVE-2018-19857

Mitre link : CVE-2018-19857

CVE.ORG link : CVE-2018-19857


JSON object : View

Products Affected

debian

  • debian_linux

videolan

  • vlc_media_player
CWE
CWE-824

Access of Uninitialized Pointer