Short Name |
HTTP:STC:STREAM:VLC-REALINDEX1 |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
VideoLAN VLC real.c ReadRealIndex Real Demuxer Integer Overflow1 |
Release Date |
2015/09/30 |
Update Number |
2541 |
Supported Platforms |
idp-4.1+, isg-3.5.141421+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects a known flaw against VideoLAN VLC Media Player. It is caused due to an integer overflow when playing a specially crafted RealMedia (.rm) file. An unauthenticated remote attacker could exploit this vulnerability by enticing a user to play a specially crafted RealMedia file. Successful exploitation would cause a heap buffer overflow allowing the attacker to execute arbitrary code with the privileges of the currently logged on user. In an attack case where code injection is not successful, VideoLAN VLC client application will terminate unexpectedly. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. The affected application would also most likely stop functioning as a result of such an attack.