Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:ACTIVEX:AXVLC

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

VideoLAN VLC ActiveX Control Exploit

Release Date

2008/03/07

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: VideoLAN VLC ActiveX Control Exploit


This signature detects attempts to exploit a known vulnerability in VideoLAN VLC ActiveX Control. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

VideoLAN VLC media player is prone to multiple memory-corruption vulnerabilities. Successfully exploiting these issues allow remote attackers to execute arbitrary code in the context of the application using the affectecd ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. These issues affect VLC media player 0.8.6 to 0.8.6c.

Affected Products

  • VideoLAN VLC media player 0.8.6
  • VideoLAN VLC media player 0.8.6A
  • VideoLAN VLC media player 0.8.6B
  • VideoLAN VLC media player 0.8.6C

References

  • BugTraq: 26675
  • CVE: CVE-2007-6262
  • URL: http://www.coresecurity.com/?action=item&id=2035
  • URL: http://www.videolan.org/sa0703.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out