![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.815256 |
Category: | General |
Title: | VLC Media Player 'libebml' Library Heap Overflow Vulnerability (Jul 2019) - Mac OS X |
Summary: | VLC Media Player is prone to a heap-based buffer over-read vulnerability. |
Description: | Summary: VLC Media Player is prone to a heap-based buffer over-read vulnerability. Vulnerability Insight: The flaw exists due to a heap-based buffer over-read error in EbmlElement::FindNextElement of the 'libebml' library as used by VLC Media Player. Vulnerability Impact: Successful exploitation will allow attackers to cause denial of service condition and launch further attacks using specially crafted files. Affected Software/OS: libebml before 1.3.6, as used in the MKV module in VLC Media Player binaries before 3.0.3 on Mac OS X. Solution: Update VLC Media Player to version 3.0.3 or later. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-13615 BugTraq ID: 109304 http://www.securityfocus.com/bid/109304 https://github.com/Matroska-Org/libebml/commit/05beb69ba60acce09f73ed491bb76f332849c3a0 https://github.com/Matroska-Org/libebml/commit/b66ca475be967547af9a3784e720fbbacd381be6 https://github.com/Matroska-Org/libebml/compare/release-1.3.5...release-1.3.6 https://trac.videolan.org/vlc/ticket/22474 https://usn.ubuntu.com/4073-1/ |
Copyright | Copyright (C) 2019 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |