Out-of-Bounds Affecting vlc package, versions <2.0.7-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
3.61% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-VLC-5698892
  • published10 Jul 2013
  • disclosed10 Jul 2013

Introduced: 10 Jul 2013

CVE-2013-3245  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade Debian:13 vlc to version 2.0.7-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream vlc package and not the vlc package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

plugins/demux/libmkv_plugin.dll in VideoLAN VLC Media Player 2.0.7, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MKV file, possibly involving an integer overflow and out-of-bounds read or heap-based buffer overflow, or an uncaught exception. NOTE: the vendor disputes the severity and claimed vulnerability type of this issue, stating "This PoC crashes VLC, indeed, but does nothing more... this is not an integer overflow error, but an uncaught exception and I doubt that it is exploitable. This uncaught exception makes VLC abort, not execute random code, on my Linux 64bits machine." A PoC posted by the original researcher shows signs of an attacker-controlled out-of-bounds read, but the affected instruction does not involve a register that directly influences control flow

CVSS Scores

version 3.1