Vulnerability Name: | CVE-2007-0017 (CCN-31226) | ||||||||||||||||||||
Assigned: | 2007-01-02 | ||||||||||||||||||||
Published: | 2007-01-02 | ||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||
Summary: | Multiple format string vulnerabilities in (1) the cdio_log_handler function in modules/access/cdda/access.c in the CDDA (libcdda_plugin) plugin, and the (2) cdio_log_handler and (3) vcd_log_handler functions in modules/access/vcdx/access.c in the VCDX (libvcdx_plugin) plugin, in VideoLAN VLC 0.7.0 through 0.8.6 allow user-assisted remote attackers to execute arbitrary code via format string specifiers in an invalid URI, as demonstrated by a udp://-- URI in an M3U file. | ||||||||||||||||||||
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:UR)
| ||||||||||||||||||||
Vulnerability Type: | CWE-134 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MISC Type: UNKNOWN http://applefun.blogspot.com/2007/01/moab-02-01-2007-vlc-media-player-udp.html Source: MITRE Type: CNA CVE-2007-0017 Source: MISC Type: UNKNOWN http://landonf.bikemonkey.org/code/macosx/MOAB_Day_2.20070103045559.6753.timor.html Source: OSVDB Type: UNKNOWN 31163 Source: CCN Type: MOAB-02-01-2007 VLC Media Player udp:// Format String Vulnerability Source: MISC Type: Exploit, Vendor Advisory http://projects.info-pull.com/moab/MOAB-02-01-2007.html Source: CCN Type: SA23592 VLC Media Player "udp://" URI Handling Format String Vulnerability Source: SECUNIA Type: Vendor Advisory 23592 Source: SECUNIA Type: Vendor Advisory 23829 Source: SECUNIA Type: Vendor Advisory 23910 Source: SECUNIA Type: Vendor Advisory 23971 Source: GENTOO Type: UNKNOWN GLSA-200701-24 Source: CCN Type: SECTRACK ID: 1017464 VLC Media Player udp:// URL Handler Format String Bug Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1017464 Source: CONFIRM Type: UNKNOWN http://trac.videolan.org/vlc/changeset/18481 Source: DEBIAN Type: UNKNOWN DSA-1252 Source: DEBIAN Type: DSA-1252 vlc -- format string Source: CCN Type: GLSA-200701-24 VLC media player: Format string vulnerability Source: SUSE Type: UNKNOWN SUSE-SA:2007:013 Source: CCN Type: OSVDB ID: 31163 VLC Media Player udp:// URI Handling Format String Source: CCN Type: OSVDB ID: 31666 xine udp:// URI Handling Format String Source: BID Type: UNKNOWN 21852 Source: CCN Type: BID-21852 VideoLan VLC Media Player Remote Format String Vulnerability Source: MLIST Type: UNKNOWN [vlc-devel] 20070102 Security hole in VLC media player for Mac... Source: CCN Type: VLC Media Player Web site VideoLAN - Free Software and Open Source video streaming solution for every OS! Source: CONFIRM Type: Patch http://www.videolan.org/patches/vlc-0.8.6-MOAB-02-01-2007.patch Source: CONFIRM Type: Vendor Advisory http://www.videolan.org/sa0701.html Source: VUPEN Type: Vendor Advisory ADV-2007-0026 Source: XF Type: UNKNOWN vlcmediaplayer-udp-format-string(31226) Source: XF Type: UNKNOWN vlcmediaplayer-udp-format-string(31226) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:14313 Source: SUSE Type: SUSE-SA:2007:013 xine format string problems | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |