Summary : Multiple overflows in VLC demuxers Date : August 2008 Affected versions : VLC media player 0.8.6i and earlier ID : VideoLAN-SA-0807 CVE reference : CVE-2008-3732, CVE-2008-3794
When parsing the header of an invalid TTA file, an integer overflow might happen causing an heap-based buffer overflow.
When parsing a response from an MMS server, an integer overflow might happen causing a stack-based buffer overflow.
If successful, a malicious third party could trigger execution of arbitrary code within the context of the VLC media player. However, because the integer overflows will cause an unusually large amount of memory to be read, a page fault is most likely to occur (segmentation fault on Unix systems, general protection fault on Windows), resulting in a termination of the VLC process.
Exploitation of this issue requires the user to explicitly open a specially crafted file, or access a malicious MMS server.
The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins), until the patch is applied.
VLC media player 0.9.1 addresses these issues. Patches for VLC media player 0.8.6 are available from the official VLC source code repository.
This vulnerability was not responsibly disclosed. There are no credits.