// For flags

CVE-2009-1045

VideoLAN VLC Media Player 0.9.8a - Web UI 'input' Remote Denial of Service

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

requests/status.xml in VLC 0.9.8a allows remote attackers to cause a denial of service (stack consumption and crash) via a long input argument in an in_play action.

El archivo requests/status.xml en VLC versión 0.9.8a, permite a los atacantes remotos causar una denegación de servicio (consumo de pila y bloqueo) por medio de un argumento de entrada largo en una acción in_play.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-03-23 CVE Reserved
  • 2009-03-23 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2024-11-06 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Videolan
Search vendor "Videolan"
Vlc Media Player
Search vendor "Videolan" for product "Vlc Media Player"
0.9.8a
Search vendor "Videolan" for product "Vlc Media Player" and version "0.9.8a"
-
Affected