Vulnerability Name:

CVE-2014-9625 (CCN-100277)

Assigned:2015-01-20
Published:2015-01-20
Updated:2020-01-29
Summary:The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integer truncation" vulnerability.
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-120
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: VideoLAN GIT Repository
misc: update: fix buffer overflow in updater

Source: MITRE
Type: CNA
CVE-2014-9625

Source: MISC
Type: Mailing List, Third Party Advisory
http://openwall.com/lists/oss-security/2015/01/20/5

Source: CCN
Type: oss-security Mailing List, Tue, 20 Jan 2015 17:08:26 +0100
Vulnerabilities in VLC 2.1.5

Source: CCN
Type: oss-security Mailing List, Tue, 20 Jan 2015 15:58:22 -0500 (EST)
Re: Vulnerabilities in VLC 2.1.5

Source: CCN
Type: BID-72252
VLC Media Player Multiple Security Vulnerabilities

Source: XF
Type: UNKNOWN
vlc-cve20149625-bo(100277)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/videolan/vlc/commit/fbe2837bc80f155c001781041a54c58b5524fc14

Source: CONFIRM
Type: Vendor Advisory
https://www.videolan.org/security/sa1501.html

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2014-9625

Vulnerable Configuration:Configuration 1:
  • cpe:/a:videolan:vlc_media_player:*:*:*:*:*:*:*:* (Version < 2.1.6)

  • Configuration CCN 1:
  • cpe:/a:videolan:vlc_media_player:2.1.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20149625
    V
    CVE-2014-9625
    2022-06-30
    oval:org.opensuse.security:def:112904
    P
    libvlc5-2.2.4-11.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:106363
    P
    libvlc5-2.2.4-11.1 on GA media (Moderate)
    2021-10-01
    oval:com.ubuntu.precise:def:20149625000
    V
    CVE-2014-9625 on Ubuntu 12.04 LTS (precise) - medium.
    2014-12-31
    oval:com.ubuntu.trusty:def:20149625000
    V
    CVE-2014-9625 on Ubuntu 14.04 LTS (trusty) - medium.
    2014-12-31
    BACK
    videolan vlc media player *
    videolan vlc media player 2.1.5