Short Name |
HTTP:STC:DL:VLC-XSPF-MEM |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
VideoLAN VLC Media Player XSPF Memory Corruption |
Release Date |
2010/10/15 |
Update Number |
1794 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known memory corruption vulnerability in VideoLAN VLC Media Player. It is due to an integer-overflow error in the XSPF playlist file parser. An attacker can entice the target user to open a crafted XSPF file to exploit this. A successful attack can lead to arbitrary code execution within the context of the application.
VLC media player is prone to a heap-based memory-corruption vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Versions prior to VLC Media Player 0.9.3 are vulnerable to this issue.