|Title:||VLC Media Player LIVE555 RTSP Server code execution vulnerability (Mac OS X)|
|Summary:||This VT has been deprecated since VLC Media player is not affected.;; The host is installed with VLC Media Player; and is prone to remote code execution vulnerability.|
This VT has been deprecated since VLC Media player is not affected.
The host is installed with VLC Media Player
and is prone to remote code execution vulnerability.
The flaw exists in the function that parses
HTTP headers for tunneling RTSP over HTTP. An attacker may create a packet
containing multiple 'Accept:' or 'x-sessioncookie' strings which could cause a
stack buffer overflow in the function 'lookForHeader'
Successful exploitation will allow an attacker
to cause a stack-based buffer overflow by sending a specially crafted packet,
resulting in code execution.
VLC Media Player versions 3.0.4 and
before on Mac OS X.
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
Common Vulnerability Exposure (CVE) ID: CVE-2018-4013|
Debian Security Information: DSA-4343 (Google Search)
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.