CVE-2008-5036 – VideoLAN VLC Media Player < 0.9.6 - '.rt' Local Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-5036
Stack-based buffer overflow in VideoLAN VLC media player 0.9.x before 0.9.6 might allow user-assisted attackers to execute arbitrary code via an an invalid RealText (rt) subtitle file, related to the ParseRealText function in modules/demux/subtitle.c. NOTE: this issue was SPLIT from CVE-2008-5032 on 20081110. Desbordamiento de búfer basado en pila en VideoLAN VLC media player v0.9.x anteriores a v0.9.6 permite a atacantes remotos asistidos por el usuario ejecutar código de su elección a través de un fichero de subtítulo de RealText (rt), relativo a la función ParseRealText en /modules/demux/subtitle.c. NOTA: Este problema es una parte de CVE-2008-5032 en 20081110. • https://www.exploit-db.com/exploits/7051 https://www.exploit-db.com/exploits/18548 http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=e3cef651125701a2e33a8d75b815b3e39681a447 http://secunia.com/advisories/32569 http://secunia.com/advisories/33315 http://security.gentoo.org/glsa/glsa-200812-24.xml http://www.openwall.com/lists/oss-security/2008/11/05/4 http://www.openwall.com/lists/oss-security/2008/11/05/5 http://www.openwall.com/lists/oss-security/2008/11/10/13 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-5032 – VideoLAN VLC Media Player < 0.9.6 - 'CUE' Local Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2008-5032
Stack-based buffer overflow in VideoLAN VLC media player 0.5.0 through 0.9.5 might allow user-assisted attackers to execute arbitrary code via the header of an invalid CUE image file, related to modules/access/vcd/cdrom.c. NOTE: this identifier originally included an issue related to RealText, but that issue has been assigned a separate identifier, CVE-2008-5036. Un desbordamiento de búfer en la región stack de la memoria en el reproductor multimedia VideoLAN VLC versiones 0.5.0 hasta 0.9.5, podría permitir a los atacantes asistidos por el usuario ejecutar código arbitrario por medio del encabezado de un archivo de imagen CUE no válido, relacionado con el archivo modules/access/vcd/cdrom.c. NOTA: este identificador originalmente incluía un problema relacionado con RealText, pero a ese problema se le ha asignado un identificador separado, CVE-2008-5036. • https://www.exploit-db.com/exploits/9686 http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=5f63f1562d43f32331006c2c1a61742de031b84d http://secunia.com/advisories/32569 http://secunia.com/advisories/33315 http://security.gentoo.org/glsa/glsa-200812-24.xml http://www.openwall.com/lists/oss-security/2008/11/05/4 http://www.openwall.com/lists/oss-security/2008/11/05/5 http://www.openwall.com/lists/oss-security/2008/11/10/13 http://www.securityfocus.com/archive/1/49811 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-4686 – VideoLAN VLC Media Player 0.9.4 - '.TY' Local Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-4686
Multiple integer overflows in ty.c in the TY demux plugin (aka the TiVo demuxer) in VideoLAN VLC media player, probably 0.9.4, might allow remote attackers to execute arbitrary code via a crafted .ty file, a different vulnerability than CVE-2008-4654. Múltiples desbordamientos de enteros en el archivo ty.c en el plugin TY demux (también se conoce como TiVo demuxer) en reproductor multimedia VideoLAN VLC, probablemente versión 0.9.4, podría permitir a los atacantes remotos ejecutar código arbitrario por medio de un archivo .ty diseñado, una vulnerabilidad diferente de CVE-2008-4654. • https://www.exploit-db.com/exploits/6798 https://www.exploit-db.com/exploits/6825 http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=d859e6b9537af2d7326276f70de25a840f554dc3 http://www.openwall.com/lists/oss-security/2008/10/19/2 http://www.openwall.com/lists/oss-security/2008/10/22/6 http://www.securityfocus.com/bid/31867 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14630 • CWE-189: Numeric Errors •
CVE-2008-4654 – VideoLAN VLC Media Player 0.9.4 - TiVo Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-4654
Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player 0.9.0 through 0.9.4 allows remote attackers to execute arbitrary code via a TiVo TY media file with a header containing a crafted size value. Desbordamiento de búfer basado en pila en la función parse_master en el plugin modules/demux/ty.c) en VLC Media Player v0.9.0 a la 0.9.4, permite a atacantes remotos ejecutar código de su elección a través de un archivo TiVo TY con una cabecera que contiene un valor de tamaño manipulado. • https://www.exploit-db.com/exploits/16629 https://www.exploit-db.com/exploits/6798 https://www.exploit-db.com/exploits/6825 https://github.com/KernelErr/VLC-CVE-2008-4654-Exploit https://github.com/rnnsz/CVE-2008-4654 https://github.com/bongbongco/CVE-2008-4654 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502726 http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=fde9e1cc1fe1ec9635169fa071e42b3aa6436033 http://git.videolan.org/?p=vlc.git%3Ba=commitdiff%3Bh=26d92b87bba99b5ea2e17b7 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-4558 – VideoLAN VLC Media Player 0.9.2 Media Player - XSPF Memory Corruption
https://notcve.org/view.php?id=CVE-2008-4558
Array index error in VLC media player 0.9.2 allows remote attackers to overwrite arbitrary memory and execute arbitrary code via an XSPF playlist file with a negative identifier tag, which passes a signed comparison. Error de índice de array en VLC media player 0.9.2 permite a atacantes remotos sobrescribir memoria de su elección y ejecutar código de su elección a través de un fichero lista de reproduccio´n XSPF con una etiqueta con identificador negativo, lo cual pasa una comparación firmada. • https://www.exploit-db.com/exploits/6756 http://secunia.com/advisories/32267 http://www.coresecurity.com/content/vlc-xspf-memory-corruption http://www.exploit-db.com/exploits/6756 http://www.securityfocus.com/archive/1/497354/100/0/threaded http://www.securityfocus.com/bid/31758 http://www.vupen.com/english/advisories/2008/2826 https://exchange.xforce.ibmcloud.com/vulnerabilities/45869 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14726 • CWE-399: Resource Management Errors •