Short Name |
HTTP:STC:STREAM:VLC-REALINDEX |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
VideoLAN VLC real.c ReadRealIndex Real Demuxer Integer Overflow |
Release Date |
2010/10/19 |
Update Number |
1794 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects a known flaw against VideoLAN VLC Media Player. It is caused due to an integer overflow when playing a specially crafted RealMedia (.rm) file. An unauthenticated remote attacker could exploit this vulnerability by enticing a user to play a specially crafted RealMedia file. Successful exploitation would cause a heap buffer overflow allowing the attacker to execute arbitrary code with the privileges of the currently logged on user. In an attack case where code injection is not successful, VideoLAN VLC client application will terminate unexpectedly. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. The affected application would also most likely stop functioning as a result of such an attack.
VLC media player is prone to a heap buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. This issues affects VLC 0.9.0 through 0.9.6.