Page 4 of 98 results (0.007 seconds)

CVSS: 9.8EPSS: 8%CPEs: 1EXPL: 0

An issue was discovered in zlib_decompress_extra in modules/demux/mkv/util.cpp in VideoLAN VLC media player 3.x through 3.0.7. The Matroska demuxer, while parsing a malformed MKV file type, has a double free. Se descubrió un problema en zlib_decompress_extra en módulos / demux / mkv / util.cpp en el reproductor de medios VideoLAN VLC 3.x a 3.0.7. El demuxer de Matroska, mientras analiza un tipo de archivo MKV con formato incorrecto, tiene un doble libre. • http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=81023659c7de5ac2637b4a879195efef50846102 http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html http://www.securityfocus.com/bid/108882 https://security.gentoo.org/glsa/201908-23 https://usn.ubuntu.com/4074-1 • CWE-415: Double Free •

CVSS: 6.5EPSS: 5%CPEs: 1EXPL: 0

A Buffer Overflow in VLC Media Player < 3.0.7 causes a crash which can possibly be further developed into a remote code execution exploit. Una desbordamiento en el buffer en VLC Media Player Player < 3.0.7 causa un bloqueo el cual, puede ser posiblemente más desarrollado hacia una explotación en la ejecución del código remoto • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html http://www.securityfocus.com/bid/108769 https://hackerone.com/reports/484398 https://security.gentoo.org/glsa/201908-23 https://usn.ubuntu.com/4074-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.1EPSS: 52%CPEs: 2EXPL: 1

The CAF demuxer in modules/demux/caf.c in VideoLAN VLC media player 3.0.4 may read memory from an uninitialized pointer when processing magic cookies in CAF files, because a ReadKukiChunk() cast converts a return value to an unsigned int even if that value is negative. This could result in a denial of service and/or a potential infoleak. El demuxer CAF en modules/demux/caf.c en VideoLAN VLC media player 3.0.4 podría leer memoria desde un puntero no inicializado al procesar cookies mágicas en los archivos CAF. Esto se debe a que una conversión ReadKukiChunk() convierte un valor de retorno a un entero sin firmar, incluso aunque ese valor sea negativo. Esto podría resultar en una denegación de servicio (DoS) o una potencial divulgación de información. • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00081.html http://www.securityfocus.com/bid/106130 https://dyntopia.com/advisories/013-vlc https://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=0cc5ea748ee5ff7705dde61ab15dff8f58be39d0 https://usn.ubuntu.com/4074-1 http • CWE-824: Access of Uninitialized Pointer •

CVSS: 8.0EPSS: 85%CPEs: 2EXPL: 3

VideoLAN VLC media player 2.2.x is prone to a use after free vulnerability which an attacker can leverage to execute arbitrary code via crafted MKV files. Failed exploit attempts will likely result in denial of service conditions. VideoLAN VLC media player en versiones 2.2.x es propenso a una vulnerabilidad de uso de memoria previamente liberada, que podría ser aprovechada por un atacante para ejecutar código arbitrario mediante archivos MKV manipulados. Los intentos de explotación fallidos podrían resultar en condiciones de denegación de servicio (DoS). • https://www.exploit-db.com/exploits/45626 http://seclists.org/fulldisclosure/2018/Jul/28 http://www.securitytracker.com/id/1041311 https://www.debian.org/security/2018/dsa-4251 https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/vlc_mkv.rb • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

The vlc_demux_chained_Delete function in input/demux_chained.c in VideoLAN VLC media player 3.0.1 allows remote attackers to cause a denial of service (heap corruption and application crash) or possibly have unspecified other impact via a crafted .swf file. PI Coresight 2016 R2 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) que podría permitir el acceso al sistema PI. OSIsoft recomienda que los usuarios actualicen a PI Vision 2017 o siguientes para mitigar esta vulnerabilidad. • http://code610.blogspot.com/2018/05/make-free-vlc.html http://www.securityfocus.com/bid/104293 http://www.securitytracker.com/id/1041312 http://www.videolan.org/security/sa1801.html • CWE-416: Use After Free •