|Title:||VLC Media Player LIVE555 RTSP Server code execution vulnerability (Windows)|
|Summary:||The host is installed with VLC Media Player; and is prone to remote code execution vulnerability.|
The host is installed with VLC Media Player
and is prone to remote code execution vulnerability.
The flaw exists in the function that parses
HTTP headers for tunneling RTSP over HTTP. An attacker may create a packet
containing multiple 'Accept:' or 'x-sessioncookie' strings which could cause a
stack buffer overflow in the function 'lookForHeader'
Successful exploitation will allow an attacker
to cause a stack-based buffer overflow by sending a specially crafted packet,
resulting in code execution.
VLC Media Player versions 3.0.4 and
before on Windows.
No known solution is available as of 02nd
November, 2018. Information regarding this issue will be updated once solution
details are available. For updates refer to Reference links.
Common Vulnerability Exposure (CVE) ID: CVE-2018-4013|
Debian Security Information: DSA-4343 (Google Search)
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.