Vulnerability Name: | CVE-2017-8311 (CCN-126870) | ||||||||||||||||
Assigned: | 2017-05-23 | ||||||||||||||||
Published: | 2017-05-23 | ||||||||||||||||
Updated: | 2018-04-27 | ||||||||||||||||
Summary: | Potential heap based buffer overflow in ParseJSS in VideoLAN VLC before 2.2.5 due to skipping NULL terminator in an input string allows attackers to execute arbitrary code via a crafted subtitles file. | ||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-8311 Source: CCN Type: VideoLAN GIT Repository subtitle: Fix invalid double increment Source: CONFIRM Type: Patch http://git.videolan.org/?p=vlc.git;a=commitdiff;h=775de716add17322f24b476439f903a829446eb6 Source: DEBIAN Type: UNKNOWN DSA-3899 Source: BID Type: UNKNOWN 98634 Source: CCN Type: BID-98634 VideoLAN VLC CVE-2017-8311 Heap Based Buffer Overflow Vulnerability Source: XF Type: UNKNOWN videolan-cve20178311-bo(126870) Source: CCN Type: Packet Storm Security [04-24-2018] VLC Media Player/Kodi/PopcornTime Memory Corruption Source: GENTOO Type: UNKNOWN GLSA-201707-10 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [04-24-2018] Source: EXPLOIT-DB Type: UNKNOWN 44514 Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-8311 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |